Zobrazeno 1 - 10
of 201
pro vyhledávání: '"PARTALA, A."'
Autor:
V. G. Zainullin, A. N. Pozhirickaya, A. M. Turlakova, A. V. Partala, O. V. Ovchinnikov, E. V. Bondarchuk, I. F. Turkanov, E. A. Galkina, V. G. Gryaznov
Publikováno v:
Аграрная наука Евро-Северо-Востока, Vol 25, Iss 5 (2024)
Field research was conducted in 2021–2023 in the conditions of the Komi Republic. Tubers of 9 potato cultivars were subjected to pre-treatment with weak non-ionizing pulsed alternating electromagnetic fields (EMF). The electromagnetic effect was ca
Externí odkaz:
https://doaj.org/article/e6ccbc91cd9c420fa503dd48f2ae3b2a
Autor:
Kokkonen, Henna, Lovén, Lauri, Motlagh, Naser Hossein, Kumar, Abhishek, Partala, Juha, Nguyen, Tri, Pujol, Víctor Casamayor, Kostakos, Panos, Leppänen, Teemu, González-Gil, Alfonso, Sola, Ester, Angulo, Iñigo, Liyanage, Madhusanka, Bennis, Mehdi, Tarkoma, Sasu, Dustdar, Schahram, Pirttikangas, Susanna, Riekki, Jukka
Future AI applications require performance, reliability and privacy that the existing, cloud-dependant system architectures cannot provide. In this article, we study orchestration in the device-edge-cloud continuum, and focus on edge AI for resource
Externí odkaz:
http://arxiv.org/abs/2205.01423
Publikováno v:
Journal of Innovation and Entrepreneurship, Vol 13, Iss 1, Pp 1-21 (2024)
Abstract Micro-enterprises have recently received increased research attention due to their contribution to economic growth and employment, and an increasing amount of research has focused on studying their performance. The current objective was to s
Externí odkaz:
https://doaj.org/article/547358097cbd4c52899d96ef5e523adf
Efficient Vehicle-to-Everything enabling cooperation and enhanced decision-making for autonomous vehicles is essential for optimized and safe traffic. Real-time decision-making based on vehicle sensor data, other traffic data, and environmental and c
Externí odkaz:
http://arxiv.org/abs/2204.03313
Publikováno v:
IEEE Access, Vol 12, Pp 172610-172637 (2024)
The pervasive use of AI assistant systems and machine learning-based applications in various fields and everyday life has significantly shifted. However, this shift is not without its challenges. The emergence of security threats, various attacks, an
Externí odkaz:
https://doaj.org/article/6129a1a8442e43b39adc0c5662815699
Autor:
Iuliia G. Samoilova, Olga E. Vaizova, Anastasia E. Stankova, Mariia V. Matveeva, Daria V. Podchinenova, Dmitry A. Kudlay, Anastasiia A. Borozinets, Tatyana A. Filippova, Ivan R. Grishkevich, Anastasia V. Partala, Diana A. Gerasimova
Publikováno v:
Терапевтический архив, Vol 96, Iss 1, Pp 63-67 (2024)
The review addresses publications on genetic polymorphisms that potentially impact the effectiveness of therapy with hypoglycemic drugs of the dipeptidyl peptidase-4 inhibitor group. The literature was searched in the PubMed database from 2017 to 202
Externí odkaz:
https://doaj.org/article/cdeed28a1539489bb1ab7d67193da513
Autor:
Ylianttila, Mika, Kantola, Raimo, Gurtov, Andrei, Mucchi, Lozenzo, Oppermann, Ian, Yan, Zheng, Nguyen, Tri Hong, Liu, Fei, Hewa, Tharaka, Liyanage, Madhusanka, Ijaz, Ahmad, Partala, Juha, Abbas, Robert, Hecker, Artur, Jayousi, Sara, Martinelli, Alessio, Caputo, Stefano, Bechtold, Jonathan, Morales, Ivan, Stoica, Andrei, Abreu, Giuseppe, Shahabuddin, Shahriar, Panayirci, Erdal, Haas, Harald, Kumar, Tanesh, Ozparlak, Basak Ozan, Röning, Juha
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and
Externí odkaz:
http://arxiv.org/abs/2004.11665
Publikováno v:
In Future Generation Computer Systems December 2023 149:606-621
Autor:
Partala, Timo1 (AUTHOR) timo.partala@xamk.fi, Jantunen, Sami1 (AUTHOR), Kuukkanen, Tommi1 (AUTHOR), Merikoski, Helena1 (AUTHOR)
Publikováno v:
Journal of Innovation & Entrepreneurship. 3/11/2024, Vol. 13 Issue 1, p1-21. 21p.
Autor:
Partala, Juha
A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plaintext message. Such schemes are useful, for example, for the implementation of privacy preserving encrypted file storag
Externí odkaz:
http://arxiv.org/abs/1510.06231