Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
1801
Overview of searchable encryption research
Published 2018-07-01“…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
Get full text
Article -
1802
Development of an analog topology for a multi-layer neuronal network
Published 2025-04-01“…The proposed methodology offers significant advantages for neuromorphic computing, especially in the domain of Internet of Things (IoT), where near-sensor data analysis and edge computation are essential.…”
Get full text
Article -
1803
Optimization technology for regional climate model-CWRF based on domestic Sunway many-core architecture
Published 2022-01-01“…CWRF(Climate-Weather Research and Forecasting model) is a component of the regional climate prediction system built in the National Climate Center, and consumes the largest proportion of time. High performance computing is a key technology used to improve the compactional performance of CWRF. …”
Get full text
Article -
1804
Assisting quality assurance of examination tasks: Using a GPT model and Bayesian testing for formative assessment
Published 2025-06-01“…Especially due to the changing and short-lived content of computer science, new questions have to be created regularly, which in turn requires quality assurance. …”
Get full text
Article -
1805
Teaching Modeling in Introductory Statistics: A Comparison of Formula and Tidyverse Syntaxes
Published 2024-10-01“…When incorporating programming into a statistics course, there are many pedagogical considerations. …”
Get full text
Article -
1806
Designing of electronic records for patients admitted to the women ward of Imam Hossein Hospital (Phase I)
Published 2017-12-01Get full text
Article -
1807
-
1808
-
1809
-
1810
Inverse Association of Longitudinal Variations in Fat Tissue Radiodensity and Area
Published 2025-06-01Get full text
Article -
1811
-
1812
Computer prediction of biological activity of 2-methyl(phenyl)-6,9-epoksybenzo[g]quinoline-4,5,10-Trion and 5-methyl-(1,2,4-triazolo[4,3-a] quinoline)
Published 2015-04-01“…The virtual screening of compounds was performed by using the computer program PASS (Prediction Activity Spectra for Substances). …”
Get full text
Article -
1813
THE SYSTEM OF AUTOMATED AVOIDANCE OF HAZARDOUS SITUATIONS AT AIRCRAFT APPROACH BEFORE GLIDESLOPE DESCENT
Published 2016-11-01“…The task solution of the optimal control and monitoring based on dynamic programming as well as a computer modeling procedure of the present process has been given. …”
Get full text
Article -
1814
GAME THEORY APPLICATION ON ONLINE TRANSPORTATION COMPANY AND DRIVER INCOME LEVELS DURING THE PANDEMIC
Published 2022-06-01Get full text
Article -
1815
Optimization Method for Reliability–Redundancy Allocation Problem in Large Hybrid Binary Systems
Published 2025-07-01Get full text
Article -
1816
Proactive Scheduling and Routing of MRP-Based Production with Constrained Resources
Published 2025-07-01Get full text
Article -
1817
Readability Formulas for Elementary School Texts in Mexican Spanish
Published 2025-06-01Get full text
Article -
1818
Aspect-Oriented Approach of Non-Functional Requirements for Embedded System-Based IoT Applications
Published 2025-01-01Get full text
Article -
1819
Novel framework on double event-triggered consensus of positive multi-agent systems
Published 2025-06-01“…The contributions of the paper lie in that: (i) A novel DAETC framework is constructed, (ii) A tractable design approach is established to obtain the gains of observer and control protocols, and (iii) A simple analysis and computation approach containing co-positive Lyapunov function (CLF) and linear programming (LP) is presented for the systems. …”
Get full text
Article -
1820