Suggested Topics within your search.
Suggested Topics within your search.
- Management 5
- Data processing 4
- Information technology 3
- Moral and ethical aspects 3
- Anesthetics 2
- Cloud computing 2
- Computer networks 2
- Computer security 2
- Data protection 2
- Handbooks, manuals, etc 2
- Visual communication 2
- computer 2
- Agriculture 1
- Anesthesia 1
- Anesthesiology 1
- Anxiety Disorders 1
- Bildanalyse 1
- Bildwissenschaft 1
- Bioinformatics 1
- Business 1
- Business intelligence 1
- COMPUTERS / Internet / General 1
- COMPUTERS / Security / General 1
- Certification 1
- Children 1
- Civil rights 1
- Cognitive Therapy 1
- Communication 1
- Computer programs 1
- Computer scheduling 1
-
21
An Analysis of Age-Related Body Composition Changes and Metabolic Patterns in Korean Adults Using FDG-PET/CT Health Screening Data
Published 2025-01-01“…The present study aimed to identify age-related changes in body composition and glucose metabolism in Korean using opportunistic FDG-PET/CT imaging. …”
Get full text
Article -
22
-
23
-
24
Cloud Computing : Data-Intensive Computing and Scheduling /
Published 2012“…Data-Intensive Computing and Scheduling /…”
View in OPAC
Book -
25
Using synthetic data for the dissemination of computational geospatial models
Published 2020-12-01“…This paper presents the process of creating synthetic geospatial data within the scope of a research project which relied on real-world data, originally captured through close collaboration with industry partners. …”
Get full text
Article -
26
Research on Sensitive Data Protection Technology on Cloud Computing
Published 2014-11-01Subjects: Get full text
Article -
27
Network optimization by regional computing for UAVs' big data
Published 2025-06-01“…Unmanned Aerial Vehicles (UAVs) are increasingly used in sectors such as surveillance, agriculture, and disaster response, generating massive volumes of real-time big data. Traditional cloud computing introduces high latency, while edge computing suffers from limited scalability. …”
Get full text
Article -
28
Comprehensive Review of Collaborative Data Caching in Edge Computing
Published 2025-01-01“…Collaborative data caching has emerged as an essential technique in this context to meet the storage and retrieval needs of edge computing systems. …”
Get full text
Article -
29
Application of big data and cloud computing in power industry
Published 2018-04-01Subjects: “…big data…”
Get full text
Article -
30
Efficiently computing RKN for keyword queries on XML data
Published 2014-07-01“…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
Get full text
Article -
31
Efficiently computing RKN for keyword queries on XML data
Published 2014-07-01“…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
Get full text
Article -
32
Optimum Large Sensor Data Filtering, Networking and Computing
Published 2023-09-01Get full text
Article -
33
CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING
Published 2016-09-01“…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
Get full text
Article -
34
A COMPUTER TECHNIQUE FOR ANALYZING RADIO‐TELEMETRY DATA
Published 1980-01-01“…Abstract An interactive computer system to analyze radio‐telemetry data has been developed and used on turkey observations. …”
Get full text
Article -
35
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
36
Efficient and configurable data transport protocol for grid computing
Published 2007-01-01Subjects: “…grid computing…”
Get full text
Article -
37
Volumetric Denoising of XCT Data Using Quantum Computing
Published 2025-02-01“…Noise, in particular, is an unavoidable issue that needs to be addressed when processing X-ray data. Therefore, this work considers the denoising of 3D volumetric data using quantum computing. …”
Get full text
Article -
38
Computers, Language and Speech: Formal Theories and Statistical Data
Published 2021-03-01Get full text
Article -
39
Survey of privacy preserving data queries in cloud computing
Published 2014-12-01Subjects: Get full text
Article -
40
Expert information technology in the collection and analysis of computer data
Published 2025-04-01Subjects: Get full text
Article