Search alternatives:
compositional » composition (Expand Search)
Showing 241 - 260 results of 52,129 for search '(compositional OR computational) data', query time: 0.42s Refine Results
  1. 241

    Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing by Zhou-zhou Liu, Shi-ning Li

    Published 2018-09-01
    “…As the high delay of large-scale data processing tasks in sensor-cloud, a sensor-cloud data acquisition scheme based on fog computing and adaptive block compressive sensing is proposed. …”
    Get full text
    Article
  2. 242
  3. 243

    Biomimetic model for computing missing data imputation and inconsistency reduction in pairwise comparisons matrices. by Waldemar W Koczkodaj, Witold Pedrycz, Alexander Pigazzini, Laura P Pigazzini

    Published 2025-01-01
    “…A biomimetic model is presented to compute missing data imputation and reduce inconsistencies in pairwise comparisons matrices. …”
    Get full text
    Article
  4. 244
  5. 245

    Instant Feedback Rapid Prototyping for GPU-Accelerated Computation, Manipulation, and Visualization of Multidimensional Data by Maximilian Malek, Christoph W. Sensen

    Published 2018-01-01
    “…Run-time compiled compute shaders enable prototyping of complex operations in a matter of minutes. …”
    Get full text
    Article
  6. 246

    Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing by Mengdi Zhao, Huiyan Chen

    Published 2025-07-01
    “…Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. …”
    Get full text
    Article
  7. 247

    An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing by Belal Z. Hassan, Ahmed. A. A. Gad-Elrab, Mohamed S. Farag, Shaban E. Abo Youssef

    Published 2022-01-01
    “…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
    Get full text
    Article
  8. 248

    STUDY OF THE PECULIARITIES OF THE STRUCTURE OF THE NASOLACRIMAL DUCT ORIFICE ACCORDING TO THE DATA OF MULTISLICE COMPUTED TOMOGRAPHY by E. L. At’kova, V. D. Yartsev, N. N. Krakhovetskiy, L. V. Reznikova, A. O. Root

    Published 2018-05-01
    “…To develop a method for investigating the perculiarities of the structure of the nasolacrimal duct orifice according to the data of multislice computed tomography (MSCT).Material and methods. …”
    Get full text
    Article
  9. 249
  10. 250

    Morphologic study of patent ductus arteriosus based on computed tomography data in 25 dogs by Heesung Umh, Kyoung-a Youp, Jeongmin Lee, Daeyun Seo, Seongsoo Lim, Beomkwan Namgoong, Ahreum Choe, Hyeajeong Hong, Nanju Lee, Isong Kim, Junghee Yoon, Jihye Choi, Kichang Lee, Hakyoung Yoon, Min Su Kim

    Published 2024-12-01
    “…IntroductionThe objective of this study is to analyze the morphology and measurement dimensions of patent ductus arteriosus (PDA) based on computed tomography images.MethodsThe present study retrospectively evaluated computed tomography angiography data from 25 client-owned dogs diagnosed with PDA. …”
    Get full text
    Article
  11. 251

    Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system by Parminder Singh, Sujatha Krishnamoorthy, Anand Nayyar, Ashish Kr Luhach, Avinash Kaur

    Published 2019-10-01
    “…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. …”
    Get full text
    Article
  12. 252

    Comparisons of computer simulations and experimental data for capacitive hyperthermia using different split-phantoms by Rami Muratoglu, Dominik Gerster, Jacek Nadobny, Alexander Hansch, Paul Krahl, Paraskevi Danai Veltsista, Marcus Beck, Daniel Zips, Pirus Ghadjar

    Published 2024-12-01
    “…However, the ability of CHT to induce significant heating throughout the body is under debate.Objectives To perform a pilot study involving comparisons of computer simulations and experimental data using different split-phantoms to validate hyperthermia treatment modeling for pre-planning for a clinical CHT system and to investigate the feasibility of split-phantom measurements in capacitive hyperthermia.Materials and methods The CHT system EHY-2030 (Oncotherm, Budapest, Hungary) was used. …”
    Get full text
    Article
  13. 253
  14. 254

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  15. 255

    Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security by Chang Jin Koo, JeongYeon Kim

    Published 2015-09-01
    “…With the economic benefits of cloud computing utilization, we provide basic arguments on data sharing issue with infrastructure providers, which requires additional investments to implement data management policies in cloud computing environment.…”
    Get full text
    Article
  16. 256

    Hybrid classical and quantum computing for enhanced glioma tumor classification using TCGA data by Emine Akpinar, Murat Oduncuoglu

    Published 2025-07-01
    “…This study introduces a novel hybrid classical and quantum computing model to distinguish LGGs from HGGs using data from The Cancer Genome Atlas (TCGA). …”
    Get full text
    Article
  17. 257

    Design of the College Students’ Music Big Data Management System Based on Computer Assistance by Peng Cheng

    Published 2022-01-01
    “…With the rapid development of science and technology, the college music big data management system also needs a computer-aided data model for optimization. …”
    Get full text
    Article
  18. 258

    A Dual Grid Collaborative Navigation Method and Computer Simulation Based on Data Link by Li Yongfeng, Hao Xiuqiang, Wu Zhenguo, Wu Gang, Guo Chubing

    Published 2025-04-01
    Subjects: “…|gnss-denied|data link|dual grid|collaborative navigation|computer simulation…”
    Get full text
    Article
  19. 259
  20. 260