Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27001
Fueling the development of elderly care services in China with digital technology: A provincial panel data analysis
Published 2025-02-01“…Objective: This study aims to investigate the transformative potential of digital technology, which includes innovations such as e-commerce, cloud computing, and artificial intelligence, on elderly care cervices in China. …”
Get full text
Article -
27002
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article -
27003
A New Video-Based Crash Detection Method: Balancing Speed and Accuracy Using a Feature Fusion Deep Learning Framework
Published 2020-01-01“…In this paper, a feature fusion-based deep learning framework was developed for video-based urban traffic crash detection task, aiming at achieving a balance between detection speed and accuracy with limited computing resource. In this framework, a residual neural network (ResNet) combined with attention modules was proposed to extract crash-related appearance features from urban traffic videos (i.e., a crash appearance feature extractor), which were further fed to a spatiotemporal feature fusion model, Conv-LSTM (Convolutional Long Short-Term Memory), to simultaneously capture appearance (static) and motion (dynamic) crash features. …”
Get full text
Article -
27004
Public Transit Loyalty Modeling Considering the Effect of Passengers’ Emotional Value: A Case Study in Xiamen, China
Published 2018-01-01“…Besides, the index score of variables was also computed to help determine targeted approaches to better improve the level of bus service. …”
Get full text
Article -
27005
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
Get full text
Article -
27006
Surgical Treatment for Spinal Tuberculosis without Elevation of Inflammatory Biomarkers at the Initial Visit Mimicking Spinal Metastasis
Published 2020-01-01“…Although the pathology revealed no malignant tumor cells, a positron emission tomography-computed tomography (PET-CT) showed upregulation of the thyroid gland and aspiration cytology revealed a thyroid carcinoma. …”
Get full text
Article -
27007
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
Get full text
Article -
27008
Oral behaviors in Chinese temporomandibular disorder patients: insights from exploratory and confirmatory factor analyses
Published 2024-12-01“…Items were contrasted with those of Italian TMDs patients (I-NFA and I-FA), and subscale scores were computed, compared, and correlated using Kruskal Wallis and Post-hoc and Spearman’s rank-order correlation (α = 0.05).ResultsVariations in NFA and FA items were observed between Chinese and Italian TMDs patients. …”
Get full text
Article -
27009
Three-dimensional effects on cracked components under anti-plane loading
Published 2015-07-01“…Increasingly powerful computers made it possible to investigate three-dimensional effects numerically in detail. …”
Get full text
Article -
27010
Influence of breed and environment on leukocyte telomere length in cattle
Published 2024-04-01“…The leukocyte telomere lengths were estimated computationally from whole-genome resequencing data. We leveraged data on leukocyte telomere length, sex, and age of 239 animals from 17 cattle breeds. …”
Get full text
Article -
27011
Research on Feature Extracted Method for Flutter Test Based on EMD and CNN
Published 2021-01-01“…The method allows for real-time, online prediction with low computational complexity.…”
Get full text
Article -
27012
Non vertical ionization-dissociation model for strong IR induced dissociation dynamics of $${{D}_{2}}O^{2+}$$
Published 2025-01-01“…However, a full quantum mechanical treatment of electron-nuclear dynamics is computationally intensive. In this work, we have developed a Strong Laser Induced non-adiabatic Multi-Ionic-Multi-Electric States (SLIMIMES) approach, which contains the electron-laser and electron-nuclear couplings. …”
Get full text
Article -
27013
Intracardiac Echocardiography as a Guide for Transcatheter Closure of Patent Ductus Arteriosus
Published 2020-01-01“…In phase 1, we compared the measurements of PDA size: pulmonary artery side diameter (PA-D), length, and aortic side diameter (Ao-D) of PDA, as measured by ICE with those measured by aortography or cardiac computed tomography (AoG/CCT) in 23 patients who underwent TC-PDA. …”
Get full text
Article -
27014
A novel arc detection and identification method in pantograph-catenary system based on deep learning
Published 2025-01-01“…Traditional arc detection methods, while functional, often suffer from low detection accuracy and high computational complexity, especially in complex operational environments. …”
Get full text
Article -
27015
Electron-spin decoherence in trityl radicals in the absence and presence of microwave irradiation
Published 2025-01-01“…We introduce partial CCE that alleviates this problem and reduces computational effort at the expense of treating only part of the correlations at a particular order. …”
Get full text
Article -
27016
A Case of Ileocecal IgG4-Related Sclerosing Mesenteritis Diagnosed by Endoscopic Ultrasound-Guided Fine Needle Aspiration using Forward-Viewing Linear Echoendoscope
Published 2019-01-01“…The patient experienced abdominal pain for 4 days with repeated vomiting episodes; therefore, she was transferred to our hospital by an ambulance. Contrast-enhanced computed tomography revealed a 3-cm tumor in the ileocecal region, which caused small bowel obstruction. …”
Get full text
Article -
27017
NIGWO-iCaps NN: A Method for the Fault Diagnosis of Fiber Optic Gyroscopes Based on Capsule Neural Networks
Published 2025-01-01“…Traditional diagnostic models often encounter challenges in terms of reliability and accuracy, for example, difficulties in feature extraction, high computational cost, and long training time. To address these challenges, this paper proposes a new fault diagnostic model that performs a fault diagnosis of gyroscopes using the enhanced capsule neural network (iCaps NN) optimized by the improved gray wolf algorithm (NIGWO). …”
Get full text
Article -
27018
From boundary data to bound states
Published 2020-01-01“…These relationships allow us to compute observables for generic orbits (such as the periastron advance ∆Φ) through analytic continuation, via a radial action depending only on boundary data. …”
Get full text
Article -
27019
Comparison of and as Reporter Genes for Noninvasive Imaging of Bone Mesenchymal Stem Cells Transplanted into Infarcted Rat Myocardium
Published 2011-07-01“…The transfected rBMSCs were transplanted into infarcted rat myocardium followed by a single-photon emission computed tomography (SPECT) study with 99m Tc-pertechnetate as the radiotracer and by autoradiography. …”
Get full text
Article -
27020
How Menstruation Is Perceived by Adolescent School Girls in Gedeo Zone of Ethiopia?
Published 2020-01-01“…Odds ratio with 95% confidence interval was computed to determine the level of significance. Result. …”
Get full text
Article