We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Nichtparametrik und rangbasierte Prozeduren

    In den letzten Jahren hat es einen großen Schub in der Entwicklung moderner nichtparametrischer Methoden für Daten aus faktoriellen Designs gegeben,...
    Arne C. Bathke, Patrick Langthaler, Georg Zimmermann in Moderne Verfahren der Angewandten Statistik
    Living reference work entry 2024
  2. Bootstrap und Permutationsverfahren für biometrische Inferenz

    Viele statistische Inferenzverfahren beruhen auf asymptotischen Verteilungsannahmen und benötigen daher große Stichprobenumfänge für valide...
    Sarah Friedrich, Frank Konietschke, Markus Pauly in Moderne Verfahren der Angewandten Statistik
    Living reference work entry 2024
  3. Verteilungsregression

    Klassische Formen der Regressionsmodellierung setzen den Erwartungswert der Zielgröße in Beziehung zu den erklärenden Variablen. Dabei wird in der...
    Thomas Kneib, Elisabeth Bergherr in Moderne Verfahren der Angewandten Statistik
    Living reference work entry 2024
  4. Instrumentenvariablen

    Für die Schätzung kausaler Effekte werden häufig multiple lineare Regressionsmodelle verwendet, in welchen sehr einfach auf weitere Einflussfaktoren...
    Helmut Farbmacher, Michael Mühlegger in Moderne Verfahren der Angewandten Statistik
    Living reference work entry 2024
  5. Air- and Sound-Quality Monitoring with Alert System Using Node MCU

    The primary objective of the Noise and Air Quality Measurement System is to address the escalating issues of sound and air pollution in contemporary...
    Ch. Bhupati, J. Rajasekhar, ... A. Bhanu Chand in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  6. IoT-Enabled Patient Assisting Device Using Ubidots Webserver

    This project is to design a new medical device, which helps to monitor medications for aged and disable people to take medicine at correct time. For...
    Chella Santhosh, P. Kanakaraja, ... Y. Asish in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  7. An IoT Framework to Support Rural Population with Diabetic Related Issues via Optimization Algorithms

    Currently, image processing and IoT technologies are notable in unravelling various challenges for medical imaging. The use of the proposed method is...
    Vinit Kumar Gunjan, Fahimuddin Shaik, Rashmi Pathak in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  8. Agricultural Monitoring and Control of a System Using Smart IoT Devices

    Our objective is to improve modern arable practices by using cutting-edge technology in agriculture to modernize the agricultural system with better...
    Y. Padma, M. Sailaja, ... Mohammed Ali Hussain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  9. IoT Security and Privacy

    Internet of Things (IoT) is one of the dominating technologies in today’s era and is adopted in a wide range of domains such as industry, business,...
    Jitendra V. Tembhurne, Tausif Diwan, Tapan Kumar Jain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  10. IOT for Healthcare

    In today’s modern environment of networking, with the growth of the Internet of Things (IoT), both individuals are linked to one another through some...
    G. Suryanarayana, L. N. C. Prakash K, ... Vinit Kumar Gunjan in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  11. Smart Home-Based Smoke Detection with Image Surveillance System

    Smoke detection senses smoke, which is typically an indicator/upcoming indicator of fire to be aware in order to prevent the loss of life,...
    K. Kiran Kumar, P. S. G. Aruna Sri, ... G. Murali in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  12. Learning Approaches for Security and Privacy in Internet of Things

    The Internet of Things (IoT) is an evolving pattern that concentrates on the links between machine, “things,” the internet, and users. One of the...
    T. Daniya, M. Geetha, ... Ch. Madhu Babu in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  13. IoT-Based Heart Disease Prediction System

    Health is wealth and it cannot be discarded. Among the many diseases, we see heart disease as the major cause of deaths. Advancement in technology...
    Vemula Manvitha, Syed Musthak Ahmed, ... Vinit Kumar Gunjan in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  14. Internet of Everything: Applications

    Internet of Things (IoT) is a network of physical things, which includes variety of smart sensing devices connected over the internet. These devices...
    Rakhi Wajgi, Jitendra V. Tembhurne, ... Tapan Jain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  15. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  16. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  17. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  18. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
  19. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.