Zobrazeno 1 - 10
of 4 643
pro vyhledávání: '"statistical tests"'
Autor:
Jaskaran Singh, Narendra N. Khanna, Ranjeet K. Rout, Narpinder Singh, John R. Laird, Inder M. Singh, Mannudeep K. Kalra, Laura E. Mantella, Amer M. Johri, Esma R. Isenovic, Mostafa M. Fouda, Luca Saba, Mostafa Fatemi, Jasjit S. Suri
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-26 (2024)
Abstract Due to the intricate relationship between the small non-coding ribonucleic acid (miRNA) sequences, the classification of miRNA species, namely Human, Gorilla, Rat, and Mouse is challenging. Previous methods are not robust and accurate. In th
Externí odkaz:
https://doaj.org/article/4580c5989c9345e59ca92e7adc0fe39d
Publikováno v:
Alexandria Engineering Journal, Vol 87, Iss , Pp 448-477 (2024)
This article presents a useful application of the Manta Ray Foraging Optimization (MRFO) algorithm for solving the adaptive infinite impulse response (IIR) system identification problem. The effectiveness of the proposed technique is validated on fou
Externí odkaz:
https://doaj.org/article/3bb76fabbfb246469f0dea4798963f9c
Publikováno v:
Journal of King Saud University: Science, Vol 36, Iss 5, Pp 103165- (2024)
The article proposes a parallel computing oriented method for solving the global minimum finding problems, in which continuous objective functions satisfy the Hölder condition, and the control parameters domain limited by continuous functions is cha
Externí odkaz:
https://doaj.org/article/2547f0cfd4594ef993e39d677f291bfa
Publikováno v:
Journal of Mathematical Sciences and Modelling, Vol 6, Iss 3, Pp 120-132 (2023)
In this study, we present a new cryptosystem named Deoxyribose Nucleic Acid (DNA) secret writing with the Laplace transform of the Mittag-Leffler function. The method is proper for encrypting large files. In this technique, we consider the original m
Externí odkaz:
https://doaj.org/article/6cc93383ad744ac1951cabacc37b96ae
Autor:
Milewski Robert, Roszak Magdalena
Publikováno v:
Studies in Logic, Grammar and Rhetoric, Vol 68, Iss 1, Pp 123-131 (2023)
The development of medicine is based on reliable medical research. This is a process that must be planned in detail and performed in accordance with the accepted study protocol, as any negligence – even a small one – or deviation from the protoco
Externí odkaz:
https://doaj.org/article/b706f5dbd8b14e23944b1ad2a46c4d02
Publikováno v:
Mathematics, Vol 12, Iss 16, p 2579 (2024)
We survey the literature on the use of Benford’s distribution digit analysis applied to COVID-19 case data reporting. We combine a bibliometric analysis of 32 articles with a survey of their content and findings. In spite of combined efforts from t
Externí odkaz:
https://doaj.org/article/8e805d2befcc487287468da6130541b9
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
Ring Oscillators (RO) are often used in true random number generators (TRNG). Their jittered clock signal, used as randomness source, originates from thermal and flicker noises. While thermal noise jitter is generally used as the main source of rando
Externí odkaz:
https://doaj.org/article/9c81c14761fe4a70923f54a6dbca3691
Publikováno v:
Наука и инновации в медицине, Vol 8, Iss 3, Pp 189-197 (2023)
Aim to statistically determine the distribution of chronic diseases in the chronology of observations; to show the specifics of methods for testing hypotheses in the quantitative and probabilistic prediction of the prevalence of polypous rhinosinusit
Externí odkaz:
https://doaj.org/article/421ec48f74744296aaf4ae4009ab0ff5
Autor:
Łukasz Matuszewski, Mieczysław Jessa
Publikováno v:
Applied Sciences, Vol 14, Iss 13, p 5642 (2024)
This paper introduces a low-complexity start–stop true random number generator (TRNG) utilizing jitter in ring oscillators (ROs). Incorporating phase detectors enhances entropy extraction from the same number of ROs. The raw bits undergo online pos
Externí odkaz:
https://doaj.org/article/09f78b3c139e4fe1987ffd9e639330ea
Publikováno v:
Cryptography, Vol 8, Iss 2, p 23 (2024)
To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The
Externí odkaz:
https://doaj.org/article/67f61ab72cc24f02a6553742aca73a6a