Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- computer 2
- Bildanalyse 1
- Bildwissenschaft 1
- COMPUTERS / Internet / General 1
- Children 1
- Cloud computing 1
- Computer scheduling 1
- Data processing 1
- Economic Policy 1
- Economic policy 1
- Economics, Mathematical 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Engineering mathematics 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- MEDICAL / Audiology & Speech Pathology 1
- Moral and ethical aspects 1
- Numerical analysis 1
- Parallel programs (Computer programs) 1
- Photography 1
-
821
Analysis of the coxal fluid of O. brasiliensis tick species by analytic techniques
Published 2025-03-01“… The coxal fluid of the tick species Ornithodoros brasiliensis (O. brasiliensis) was subjected to detailed chemical analysis using Instrumental Neutron Activation Analysis (INAA) and Energy Dispersive X-ray Fluorescence (EDXRF). …”
Get full text
Article -
822
Lean digital education to resolve the paradox of the illusion of digital prosperity
Published 2025-03-01Subjects: “…I21 Analysis of Education…”
Get full text
Article -
823
-
824
Multi-omics insights into biomarkers of breast cancer associated diabetes: a computational approach
Published 2025-06-01“…We reanalyzed transcriptomic data by stratifying BC patients with and without diabetes into two cohorts, identifying 3,245 DEGs in AA and 3,208 DEGs in EA, with 786 genes commonly altered between both groups. …”
Get full text
Article -
825
Introduction to Knowledge Discovery in Medical Databases and Use of Reliability Analysis in Data Mining
Published 2015-10-01Get full text
Article -
826
Comparison of neuroprognostic performance between manually and automatically computed gray-white matter ratios on brain computed tomography following cardiac arrest: A systematic r...
Published 2025-08-01“…A Bayesian bivariate random-effects meta-analysis model was used to synthesize data. Between-study heterogeneity was quantified using the I² statistic, and publication bias was assessed with Deek’s test. …”
Get full text
Article -
827
Improving drug repositioning with negative data labeling using large language models
Published 2025-02-01Get full text
Article -
828
Data of REEs (Ce, Nd, Th) analysis from Bangka tin tailing applying froth flotation method using sodium oleate and KClO3Mendeley DataMendeley DataMendeley Data
Published 2024-12-01“…This article presented the data of REEs (Rare Earth Elements) analysis from exploitation of Bangka tin tailing, Indonesia. …”
Get full text
Article -
829
Edge Computing and Cloud Computing for Internet of Things: A Review
Published 2024-09-01“…The rapid expansion of the Internet of Things ecosystem has created an urgent need for efficient data processing and analysis technologies. This review aims to systematically examine and compare edge computing, cloud computing, and hybrid architectures, focusing on their applications within IoT environments. …”
Get full text
Article -
830
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
831
CWL-PLAS: Task Workflows Assisted by Data Science Cloud Platforms
Published 2023-01-01“…The Common Workflow Language (CWL) is a platform-independent description language for the representation of data science workflows consisting of a set of tasks that interact with each other to perform scientific analysis. …”
Get full text
Article -
832
Modern Deep Learning Techniques for Big Medical Data Processing in Cloud
Published 2025-01-01“…The recent advancements in Machine Learning (ML) and Deep Learning (DL) provide a new dimension in biomedical big data analysis, while the cloud computing technologies present the breakthroughs of handling massive data from hardware, software, and storage. …”
Get full text
Article -
833
Application and evaluation of PCA-CA composite model for technical effectiveness in table tennis matches
Published 2025-04-01Get full text
Article -
834
Work in process level definition: a method based on computer simulation and electre tri
Published 2014-09-01“…The research method is based on Computer Simulation, supported by quantitative data analysis. …”
Get full text
Article -
835
Work in process level definition: a method based on computer simulation and electre tri
Published 2013-09-01“…The research method is based on Computer Simulation, supported by quantitative data analysis. …”
Get full text
Article -
836
Predictive diagnostics of computer systems logs using natural language processing techniques
Published 2025-07-01Get full text
Article -
837
-
838
Privacy-preserving and verifiable spectral graph analysis in the cloud
Published 2025-05-01“…Abstract Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. …”
Get full text
Article -
839
MULTILEVEL MODAL VALUE ANALYSIS FOR INTERPRETING CATEGORICAL K-MEDOIDS CLUSTERS DATA
Published 2025-01-01Get full text
Article -
840
Cloud-based configurable data stream processing architecture in rural economic development
Published 2024-11-01Get full text
Article