-
1541
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
1542
Big data of numerical nuclear reactor and its application
Published 2021-09-01“…The massive amount of data involved in the operation of numerical nuclear reactor (numerical reactor) can be used to optimize existing numerical reactor models, obtain scientific discoveries in the field of nuclear energy, and promote numerical reactor research.Based on the review of the existing data-driven modeling and the prediction of microscopic phenomena in reactors, the concept of the big data of numerical nuclear reactor was put forward, and its important characteristics as industrial and simulation big data were analyzed according to the characteristics of the field of nuclear energy.Taking China virtual reactor 1.0 (CVR 1.0) as an example, starting from the variety, dependency and inaccuracy of the big data of numerical nuclear reactor, the research work of modeling optimization and scientific discovery was carried out by using the multidisciplinary techniques such as neural network, mathematical statistics and numerical analysis, which illustrates the guiding role of the characteristics of the big data of numerical nuclear reactors in numerical reactor research.…”
Get full text
Article -
1543
A Survey of Datacenter and Optical Data Center Networks
Published 2024-09-01“…The present study offers an overview of the datacenter technology and optical datacenter with details of its concepts and technologies. First, the optical data center systems are described and the components that describe it are network operations. …”
Get full text
Article -
1544
Identificação de benchmarks e anti-benchmarks para companhias aéreas usando modelos DEA e fronteira invertida Use of DEA and inverted frontier for airlines benchmarking and anti-be...
Published 2012-12-01“…A eficiência das empresas aéreas em 2007 foi avaliada através da comparação dos resultados obtidos no modelo de Análise Envoltória de Dados (Data Envelopment Analysis - DEA) clássico com os calculados pelo método da fronteira invertida. …”
Get full text
Article -
1545
Data acquisition for digitisation in the paraffin candle production process
Published 2023-05-01“…Data acquisition, which permits the collection and analysis of real-time data from equipment and processes, is a crucial component of the digitalisation of industrial automation. …”
Get full text
Article -
1546
Introduction of neural network technologies to optimise the control of the operating modes of a sucker-rod pump installation
Published 2025-02-01“…The study used data analysis and adaptive management methods to optimise the operation of the SRP. …”
Get full text
Article -
1547
Improved Cluster Intelligent and Complex Optimization Algorithm for Power Equipment CAD-Assisted Intelligent Operation and Maintenance
Published 2022-01-01“…Based on this, the CAD-aided intelligent operation and maintenance graph of power system equipment is used to apply the cluster intelligent complex data contained in the quality inspection of the different types of data obtained to restrict the relationship between different entities for the value of knowledge contained in the collected power data in the operation process and control stage of the power system. …”
Get full text
Article -
1548
Interactive Visualization for the GTFS and GTFS-RT Data of Budapest
Published 2025-06-01“…In this paper, we present our dataset that was built by retrieving and pre-processing the data sources of the open data platform of BKK Futár, hosted by the Centre for Budapest Transport Company (BKK). …”
Get full text
Article -
1549
Adaptive Data Warehouse as the Technological basis of the banking Ecosystem
Published 2020-06-01“…The article tackles the approach towards development of an adaptive model of a banking data warehouse, based on the principle of splitting data into components. …”
Get full text
Article -
1550
The Importance of AI Data Governance in Large Language Models
Published 2025-05-01“…AI data governance is a crucial framework for ensuring that data are utilized in the lifecycle of large language model (LLM) activity, from the development process to the end-to-end testing process, model validation, secure deployment, and operations. …”
Get full text
Article -
1551
The Formation of Artificial Data based on a Conveyor Enterprise
Published 2025-08-01“…The research is devoted to the analysis and development of methods for generating artificial data in order to solve computer vision problems that arise during the operation of conveyor-type technological lines. …”
Get full text
Article -
1552
Data Warehouse Failover Cluster for Analytical Queries in Banking
Published 2023-07-01“…The banking sector assigns high priority to data storage, as it is a critical aspect of business operations. …”
Get full text
Article -
1553
Forecasting the Cumulative Confirmed Cases with the FGM and Fractional-Order Buffer Operator in Different Stages of COVID-19
Published 2021-01-01“…The empirical analysis of seven countries’ data shows that the FGM with the fractional-order buffer operator achieves the best results for most cases. …”
Get full text
Article -
1554
Snakebite case management: a cohort study in Northwest Ethiopia, 2012-2020
Published 2022-08-01Get full text
Article -
1555
SETI@home: Data Acquisition and Front-end Processing
Published 2025-01-01“…SETI@home is a radio Search for Extraterrestrial Intelligence (SETI) project, looking for technosignatures in data recorded at multiple observatories from 1998–2020. …”
Get full text
Article -
1556
Does Corporate Reputation Affect Safety Climate in Mining Operations? The Mediating Role of Perceived Ethical Climate
Published 2023-11-01“…A total of 163 questionnaires were collected by using the questionnaire technique and convenience sampling method. The collected data were analyzed with the SPSS 23.0 analysis program. …”
Get full text
Article -
1557
A BERT-MRC-based method for key entity recognition in power grid field operation texts
Published 2025-07-01“…Based on an analysis of the characteristics of power grid field operation texts, this paper proposes a key entity recognition method tailored for risk control and inspection of power grid operations. …”
Get full text
Article -
1558
ENVIRONMENTAL MANAGEMENT ACCOUNTING AND OPERATING PERFORMANCE OF LISTED OIL COMPANIES: A LONGITUDINAL STUDY IN AN EMERGING ECONOMY
Published 2024-12-01“…Data collected were analysed using both descriptive and inferential statistics, which include panel data regression analysis to measure the significance and direction of the relationship among these variables. …”
Get full text
Article -
1559
Protocol for a scoping review on ‘surgical sabermetrics:’ technology-enhanced measurement of operative non-technical skills
Published 2023-02-01“…Multiple reviewers will be responsible for screening of studies and data extraction.Ethics and dissemination This is a review study, not using primary data, and therefore, ethical approval is not required. …”
Get full text
Article -
1560