Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11081
Enhancing unsupervised learning in medical image registration through scale-aware context aggregation
Published 2025-02-01“…Traditional registration algorithms often require significant computational resources due to iterative optimization, while deep learning approaches face challenges in managing diverse deformation complexities and task requirements. …”
Get full text
Article -
11082
RF-PSSM: A Combination of Rotation Forest Algorithm and Position-Specific Scoring Matrix for Improved Prediction of Protein-Protein Interactions Between Hepatitis C Virus and Human
Published 2023-03-01“…An increasing number of clinically and experimentally validated interactions between HCV and human proteins have been documented in public databases, facilitating studies based on computational methods. In this study, we proposed a new computational approach, rotation forest position-specific scoring matrix (RF-PSSM), to predict the interactions among HCV and human proteins. …”
Get full text
Article -
11083
TOPS-speed complex-valued convolutional accelerator for feature extraction and inference
Published 2025-01-01“…The ever-increasing data capacity and network scale place substantial demands on underlying computing hardware. In parallel with the successes and extensive efforts made in electronics, optical neuromorphic hardware is promising to achieve ultra-high computing performances due to its inherent analog architecture and wide bandwidth. …”
Get full text
Article -
11084
Modern approaches to artificial gene synthesis: aspects of oligonucleotide synthesis, enzymatic assembly, sequence verification and error correction
Published 2018-08-01“…Synthetic biology accumulates the achievements of modern biological sciences, programming and computational modeling as well as engineering technologies for creation of biological objects with user-defined properties. …”
Get full text
Article -
11085
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
11086
A gender perspective on Internet use: consequences for information seeking on the net
Published 2005-01-01“…Some analyses were strictly quantitative and compared data from coded qualitative material with questionnaires and computer logs in a database sheet. Others were of qualitative nature and based on selected material from the coded texts. …”
Get full text
Article -
11087
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…Cloud computing is renowned for delivering information technology services based on internet. …”
Get full text
Article -
11088
A human single-neuron dataset for object recognition
Published 2025-01-01“…Together, our extensive dataset, offering the highest spatial and temporal resolution currently available in humans, will not only facilitate a comprehensive analysis of the neural correlates of object recognition but also provide valuable opportunities for training and validating computational models.…”
Get full text
Article -
11089
Downlink wireless resource allocation method of V2X based on wireless sensing assistance
Published 2022-09-01“…In vehicle-to-everything, the high-speed distribution and sharing of perception and safety data is crucial to road safety.However, the instability of communication links caused by high-speed vehicle movement will make the existing communication resource allocation methods based on vehicle location information reporting no longer efficient.Therefore, a downlink wireless resource allocation method based on wireless sensing assistance of communication nodes was proposed.Firstly, a joint optimization problem of communication mode selection and wireless resource allocation under the orthogonality of communication and sensing resources was constructed.Then, a communication mode selection based on clustering by Delaunay triangulation and a resource allocation strategy based on improved graph coloring to improve the downlink throughput was proposed to solve the problem of construction.Finally, the impact of wireless sensing estimation error and the number of vehicles on the performance of the algorithm was simulated and analyzed.Simulation results show that compared with traditional methods, the proposed algorithm can obtain better downlink communication performance gain under the same proportion of sensing bandwidth resources, and can withstand the impact of larger sensing errors on performance.At the same time, the computational complexity of the proposed algorithm is lower and the network computing resources can be saved.…”
Get full text
Article -
11090
Staff Attendance Management System: A Case Study of Kinyamaseke Town Council Kasese District.
Published 2024“…The staff members can consult the appropriate system admin on the computer, which has helped them to keep updated about their attendance. …”
Get full text
Thesis -
11091
Comprehensive metabolite profiling and evaluation of anti-nociceptive and anti-inflammatory potencies of Nypa fruticans (Wurmb.) leaves: Experimental and in-silico approaches
Published 2025-02-01“…The identified compounds were subsequently evaluated by computational studies against the cyclooxygenase-2 enzyme. …”
Get full text
Article -
11092
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…To the comparison, the average time required to compute the algorithm by the three devices is used. …”
Get full text
Article -
11093
-
11094
-
11095
Fluorescence images of skin lesions and automated diagnosis using convolutional neural networks
Published 2025-04-01Get full text
Article -
11096
Membrane-bound model of the ternary complex between factor VIIa/tissue factor and factor X
Published 2025-02-01“…This lipid dependence has made experimental characterization of the EC structure challenging. Using a novel computational methodology combining rigid-body protein-protein docking and extensive nonequilibrium molecular dynamics simulations in the explicit presence of a membrane, we developed, to our knowledge, the first atomic-level model of the EC, taking full account of the role of the membrane. …”
Get full text
Article -
11097
-
11098
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01“…This model aims to improve the accuracy and effectiveness of security measures by integrating advanced computational practices with systematic modeling. Initially, a systematic evaluation of existing 5G network security threats was conducted to identify gaps and incorporate best practices into the proposed model. …”
Get full text
Article -
11099
-
11100
Positional embeddings and zero-shot learning using BERT for molecular-property prediction
Published 2025-02-01Get full text
Article