Showing 21 - 40 results of 52,129 for search '(computational OR composition) data', query time: 0.35s Refine Results
  1. 21

    An Analysis of Age-Related Body Composition Changes and Metabolic Patterns in Korean Adults Using FDG-PET/CT Health Screening Data by Chang-Myung Oh, Ji-In Bang, Sang Yoon Lee, Jae Kyung Lee, Jee Won Chai, So Won Oh

    Published 2025-01-01
    “…The present study aimed to identify age-related changes in body composition and glucose metabolism in Korean using opportunistic FDG-PET/CT imaging. …”
    Get full text
    Article
  2. 22
  3. 23

    The Data Pharmacy by Aleena Chia, Joshua Neves

    Published 2022-12-01
    Subjects: “…data…”
    Get full text
    Article
  4. 24

    Cloud Computing : Data-Intensive Computing and Scheduling / by Magoulès, F. (Frédéric)

    Published 2012
    “…Data-Intensive Computing and Scheduling /…”
    View in OPAC
    Book
  5. 25

    Using synthetic data for the dissemination of computational geospatial models by Kostas CHELIOTIS

    Published 2020-12-01
    “…This paper presents the process of creating synthetic geospatial data within the scope of a research project which relied on real-world data, originally captured through close collaboration with industry partners. …”
    Get full text
    Article
  6. 26
  7. 27

    Network optimization by regional computing for UAVs' big data by Afzal Badshah, Ali Daud, Omar Ibrahim Aboulola, Amal Bukhari, Bader Alshemaimri, Hussain Dawood

    Published 2025-06-01
    “…Unmanned Aerial Vehicles (UAVs) are increasingly used in sectors such as surveillance, agriculture, and disaster response, generating massive volumes of real-time big data. Traditional cloud computing introduces high latency, while edge computing suffers from limited scalability. …”
    Get full text
    Article
  8. 28

    Comprehensive Review of Collaborative Data Caching in Edge Computing by Abdul Tawab Akrami, Girija Attigeri, Manjula C. Belavagi

    Published 2025-01-01
    “…Collaborative data caching has emerged as an essential technique in this context to meet the storage and retrieval needs of edge computing systems. …”
    Get full text
    Article
  9. 29
  10. 30

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
    Get full text
    Article
  11. 31

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
    Get full text
    Article
  12. 32
  13. 33

    CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING by M. M. Tatur

    Published 2016-09-01
    “…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
    Get full text
    Article
  14. 34

    A COMPUTER TECHNIQUE FOR ANALYZING RADIO‐TELEMETRY DATA by Gregory. T. Koeln

    Published 1980-01-01
    “…Abstract An interactive computer system to analyze radio‐telemetry data has been developed and used on turkey observations. …”
    Get full text
    Article
  15. 35

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  16. 36
  17. 37

    Volumetric Denoising of XCT Data Using Quantum Computing by Thomas Lang, Anja Heim, Anastasia Papadaki, Kilian Dremel, Dimitri Prjamkov, Martin Blaimer, Markus Firsching, Stefan Kasperl, Theobald O.J. Fuchs

    Published 2025-02-01
    “…Noise, in particular, is an unavoidable issue that needs to be addressed when processing X-ray data. Therefore, this work considers the denoising of 3D volumetric data using quantum computing. …”
    Get full text
    Article
  18. 38
  19. 39
  20. 40