Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- computer 2
- Bildanalyse 1
- Bildwissenschaft 1
- COMPUTERS / Internet / General 1
- Children 1
- Cloud computing 1
- Computer scheduling 1
- Data processing 1
- Economic Policy 1
- Economic policy 1
- Economics, Mathematical 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Engineering mathematics 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- MEDICAL / Audiology & Speech Pathology 1
- Moral and ethical aspects 1
- Numerical analysis 1
- Parallel programs (Computer programs) 1
- Photography 1
-
261
-
262
A novel, human-in-the-loop computational grounded theory framework for big social data
Published 2025-06-01“…In the context of qualitative data analysis, a major challenge is that conventional methods require intensive manual labour and are often impractical to apply to large datasets. …”
Get full text
Article -
263
-
264
Synthetic Data-Driven Approaches for Chinese Medical Abstract Sentence Classification: Computational Study
Published 2025-03-01Get full text
Article -
265
Compositional and Machine Learning Tools to Model Plant Nutrition: Overview and Perspectives
Published 2025-02-01Subjects: “…compositional data analysis…”
Get full text
Article -
266
Computational tools and data integration to accelerate vaccine development: challenges, opportunities, and future directions
Published 2025-03-01“…Furthermore, we highlight specific challenges associated with uncertainty quantification in vaccine development and emphasize the importance of establishing standardized data formats and ontologies to facilitate the integration and analysis of heterogeneous data. …”
Get full text
Article -
267
A mobile cloud computing framework for execution of data as a service using cloudlet
Published 2021-06-01“…Besides getting used in MCC, mobile devices also have roles in various emerging technologies like, ubiquitous computing, pervasive computing, context aware based computing, big data analysis, utility computing, fog computing and 5G based technologies. …”
Get full text
Article -
268
Instant Feedback Rapid Prototyping for GPU-Accelerated Computation, Manipulation, and Visualization of Multidimensional Data
Published 2018-01-01“…We have created an open-source application and framework for rapid GPU-accelerated prototyping, targeting image analysis, including volumetric images such as CT or MRI data. …”
Get full text
Article -
269
-
270
Anatomical characteristics of the pubic symphysis of the second period of adulthood according to computer tomography data
Published 2025-06-01“…Results. Comparative analysis of the data reveals a tendency to predominance of the parameters of width, thickness and X-ray density in the upper part of the pubic symphysis in the sample of male subjects (p > 0.05). …”
Get full text
Article -
271
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
272
A Computing Model of Selective Attention for Service Robot Based on Spatial Data Fusion
Published 2018-01-01Get full text
Article -
273
An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing
Published 2022-01-01“…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
Get full text
Article -
274
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
Published 2025-07-01“…Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. …”
Get full text
Article -
275
-
276
STPam: Software for Intelligently Analyzing and Mining Spatiotemporal Processes Based on Multi-Source Big Data
Published 2025-02-01Subjects: Get full text
Article -
277
Classifying with uncertain data envelopment analysis
Published 2024-01-01“…Our computational model uses uncertain data envelopment analysis to define a classification's proximity to equitable efficiency, which is an aggregate measure of intra-similarity within a classification's categories. …”
Get full text
Article -
278
Calculations of the nuclide composition of spent nuclear fuel RBMK-1000 for verification computer module SCALE-6
Published 2013-12-01“…In the analysis of the results of calculations and comparison with experimental data were considered only actinides, which constitute 99 % of the mass of spent nuclear fuel. …”
Get full text
Article -
279
Exploring the adoption of collections as data in the GLAM context
Published 2025-05-01“…This research investigates the adoption of collections as data in GLAM institutions, aiming to highlight best practices for computational use and machine-readable sharing of digital collections. …”
Get full text
Article -
280
Integrative analysis of multi-omics data and gut microbiota composition reveals prognostic subtypes and predicts immunotherapy response in colorectal cancer using machine learning
Published 2025-07-01“…We performed an integrative analysis of multi-omics data from 274 CRC patients to investigate the impact of gut microbiota composition on prognosis, identify novel subtypes, and develop a machine learning-based prognostic model. …”
Get full text
Article