Zobrazeno 1 - 10
of 183
pro vyhledávání: '"Bao Huynh"'
Publikováno v:
IEEE Access, Vol 12, Pp 85745-85760 (2024)
Scientists not only engage in research, but also write articles based on their work, and naturally aim to submit their articles to prestigious, well-received, and highly regarded journals or conferences. One way to measure the prestige of a journal i
Externí odkaz:
https://doaj.org/article/d6c171cfe22b41c296d1794d4e97f94e
Publikováno v:
Vietnam Journal of Computer Science, Vol 10, Iss 03, Pp 357-372 (2023)
The purpose of mining sequential patterns problem with weighted constraints is to find high-valued patterns, including infrequent patterns but having items which appear in the pattern of high importance in the sequence database (SD). Therefore, weigh
Externí odkaz:
https://doaj.org/article/d2ac12fabbe049d28f76dee13fb456b1
Publikováno v:
Journal of Functional Biomaterials, Vol 15, Iss 5, p 117 (2024)
Cargo encapsulation through emulsion-based methods has been pondered over the years. Although several microemulsification techniques have been employed for the microcapsule’s synthesis, there are still no clear guidelines regarding the suitability
Externí odkaz:
https://doaj.org/article/ac1648c663c746d4b94cd38fd4009629
Publikováno v:
Polymers, Vol 15, Iss 16, p 3346 (2023)
The field of dental materials is undergoing rapid advancements in the pursuit of an innovative generation of dental polymeric restorative materials. There is a growing interest in the development of a distinct category of dental polymers that transce
Externí odkaz:
https://doaj.org/article/3e9520d356f54065a40e2424ddcb62f5
Publikováno v:
IEEE Access, Vol 9, Pp 161305-161317 (2021)
Sequence pattern mining is a core task of data mining in various fields. Clickstream pattern mining, a variant of sequence pattern mining, is very useful in e-commerce, and is used to analyze, evaluate and predict online customer behaviors, attractin
Externí odkaz:
https://doaj.org/article/6fdfcc8658984e8c8a513f25259a00bb
Autor:
Mehdi Hosseinzadeh, Jan Lansky, Amir Masoud Rahmani, Cuong Trinh, Masoumeh Safkhani, Nasour Bagheri, Bao Huynh
Publikováno v:
IEEE Access, Vol 8, Pp 125029-125045 (2020)
Radio Frequency Identification (RFID) systems represent a key technology for ubiquitous computing and for the deployment of the Internet of Things (IoT). In RFID technology, authentication protocols are often necessary in order to confirm the identit
Externí odkaz:
https://doaj.org/article/82cb3a5d2e3a403c990e4d3644bf8ec2
Autor:
Mehdi Hosseinzadeh, Omed Hassan Ahmed, Sarkar Hasan Ahmed, Cuong Trinh, Nasour Bagheri, Saru Kumari, Jan Lansky, Bao Huynh
Publikováno v:
IEEE Access, Vol 8, Pp 126977-126987 (2020)
In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al. (IEEE Access, 7:8376-8384, 2019), a hash-based protocol and a Rabin public key based protocol. Our security analysis clearly
Externí odkaz:
https://doaj.org/article/5607b6a0013446f184e99d7526120a63
Autor:
Mehdi Hosseinzadeh, Quan Thanh Tho, Saqib Ali, Amir Masoud Rahmani, Alireza Souri, Monire Norouzi, Bao Huynh
Publikováno v:
IEEE Access, Vol 8, Pp 85939-85949 (2020)
Cloud-edge computing is a hybrid model of computing where resources and services provided via the Internet of Things (IoT) between large-scale and long-term data informs of the cloud layer and small-scale and short-term data as edge layer. The main c
Externí odkaz:
https://doaj.org/article/4c61a1669ed147a3af129d95ec7dc232
Autor:
Cuong Trinh, Bao Huynh, Jan Lansky, Stanislava Mildeova, Masoumeh Safkhani, Nasour Bagheri, Saru Kumari, Mehdi Hosseinzadeh
Publikováno v:
IEEE Access, Vol 8, Pp 165536-165550 (2020)
The communication security of constrained objects such as radio frequency identification (RFID) tags and wireless sensor network (WSN) is very challenging because it is not always possible to use the conventional on-the-shelf solutions for them, due
Externí odkaz:
https://doaj.org/article/2d621565534546bd97ba8ed73e31623d
Publikováno v:
IEEE Access, Vol 5, Pp 17392-17402 (2017)
Mining frequent closed sequential pattern (FCSPs) has attracted a great deal of research attention, because it is an important task in sequences mining. In recently, many studies have focused on mining frequent closed sequential patterns because, suc
Externí odkaz:
https://doaj.org/article/765b63d5aa49420b80a546d3ef6faf02