Suggested Topics within your search.
Suggested Topics within your search.
- Management 5
- Data processing 4
- Information technology 3
- Moral and ethical aspects 3
- Anesthetics 2
- Cloud computing 2
- Computer networks 2
- Computer security 2
- Data protection 2
- Handbooks, manuals, etc 2
- Visual communication 2
- computer 2
- Agriculture 1
- Anesthesia 1
- Anesthesiology 1
- Anxiety Disorders 1
- Bildanalyse 1
- Bildwissenschaft 1
- Bioinformatics 1
- Business 1
- Business intelligence 1
- COMPUTERS / Internet / General 1
- COMPUTERS / Security / General 1
- Certification 1
- Children 1
- Civil rights 1
- Cognitive Therapy 1
- Communication 1
- Computer programs 1
- Computer scheduling 1
-
241
Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing
Published 2018-09-01“…As the high delay of large-scale data processing tasks in sensor-cloud, a sensor-cloud data acquisition scheme based on fog computing and adaptive block compressive sensing is proposed. …”
Get full text
Article -
242
Cauliflower leaf diseases: A computer vision dataset for smart agricultureMendeley Data
Published 2025-06-01Get full text
Article -
243
Biomimetic model for computing missing data imputation and inconsistency reduction in pairwise comparisons matrices.
Published 2025-01-01“…A biomimetic model is presented to compute missing data imputation and reduce inconsistencies in pairwise comparisons matrices. …”
Get full text
Article -
244
Attention mechanism and mixup data augmentation for classification of COVID-19 Computed Tomography images
Published 2022-09-01Subjects: Get full text
Article -
245
Instant Feedback Rapid Prototyping for GPU-Accelerated Computation, Manipulation, and Visualization of Multidimensional Data
Published 2018-01-01“…Run-time compiled compute shaders enable prototyping of complex operations in a matter of minutes. …”
Get full text
Article -
246
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Published 2025-07-01“…Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. …”
Get full text
Article -
247
An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing
Published 2022-01-01“…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
Get full text
Article -
248
STUDY OF THE PECULIARITIES OF THE STRUCTURE OF THE NASOLACRIMAL DUCT ORIFICE ACCORDING TO THE DATA OF MULTISLICE COMPUTED TOMOGRAPHY
Published 2018-05-01“…To develop a method for investigating the perculiarities of the structure of the nasolacrimal duct orifice according to the data of multislice computed tomography (MSCT).Material and methods. …”
Get full text
Article -
249
Evaluation of Geo-SPEBH algorithm based on Bandwidth for Big Data retrieval in Cloud Computing
Published 2022-09-01Get full text
Article -
250
Morphologic study of patent ductus arteriosus based on computed tomography data in 25 dogs
Published 2024-12-01“…IntroductionThe objective of this study is to analyze the morphology and measurement dimensions of patent ductus arteriosus (PDA) based on computed tomography images.MethodsThe present study retrospectively evaluated computed tomography angiography data from 25 client-owned dogs diagnosed with PDA. …”
Get full text
Article -
251
Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Published 2019-10-01“…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. …”
Get full text
Article -
252
Comparisons of computer simulations and experimental data for capacitive hyperthermia using different split-phantoms
Published 2024-12-01“…However, the ability of CHT to induce significant heating throughout the body is under debate.Objectives To perform a pilot study involving comparisons of computer simulations and experimental data using different split-phantoms to validate hyperthermia treatment modeling for pre-planning for a clinical CHT system and to investigate the feasibility of split-phantom measurements in capacitive hyperthermia.Materials and methods The CHT system EHY-2030 (Oncotherm, Budapest, Hungary) was used. …”
Get full text
Article -
253
-
254
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
255
Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security
Published 2015-09-01“…With the economic benefits of cloud computing utilization, we provide basic arguments on data sharing issue with infrastructure providers, which requires additional investments to implement data management policies in cloud computing environment.…”
Get full text
Article -
256
Hybrid classical and quantum computing for enhanced glioma tumor classification using TCGA data
Published 2025-07-01“…This study introduces a novel hybrid classical and quantum computing model to distinguish LGGs from HGGs using data from The Cancer Genome Atlas (TCGA). …”
Get full text
Article -
257
Design of the College Students’ Music Big Data Management System Based on Computer Assistance
Published 2022-01-01“…With the rapid development of science and technology, the college music big data management system also needs a computer-aided data model for optimization. …”
Get full text
Article -
258
A Dual Grid Collaborative Navigation Method and Computer Simulation Based on Data Link
Published 2025-04-01Subjects: “…|gnss-denied|data link|dual grid|collaborative navigation|computer simulation…”
Get full text
Article -
259
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques
Published 2025-01-01Subjects: Get full text
Article -
260
Analysis method and experimental conditions affect computed circadian phase from melatonin data.
Published 2012-01-01Get full text
Article