Showing 24,801 - 24,820 results of 28,739 for search '"computing"', query time: 0.11s Refine Results
  1. 24801

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  2. 24802

    Effect of short basalt fibers on energy-dissipating properties of lightweight rubberized concrete shear wall by Artem Zaitsev, Evgenii Matiushin, Victoria Shvetsova, Alexander Burukhin, Stepan Konev, Radmir Karamov, Skolkovo Institute of Science and Technology, Moscow – 121205, Russia.

    Published 2024-09-01
    “…Scanning electron microscopy and computer tomography were used to validate the material's inner structure, adhesion, crumb rubber and basalt fiber distribution. …”
    Get full text
    Article
  3. 24803

    Integrated AutoML-based framework for optimizing shale gas production: A case study of the Fuling shale gas field by Tianrui Ye, Jin Meng, Yitian Xiao, Yaqiu Lu, Aiwei Zheng, Bang Liang

    Published 2025-03-01
    “…To demystify the “black-box” nature of the ensemble model, KernelSHAP, a kernel-based approach to compute Shapley values, is utilized for elucidating the influential factors that affect shale gas production at both global and local scales. …”
    Get full text
    Article
  4. 24804

    Nature–Inspired Metaheuristic Optimization for Control Tuning of Complex Systems by Jesús Garicano-Mena, Matilde Santos

    Published 2024-12-01
    “…The performance of the ALO and WOA techniques for the tuning of conventional PID controllers is evaluated in relation to the number of agents <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mi>S</mi></msub></semantics></math></inline-formula> and the maximum number of iterations <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mrow><mi>M</mi><mi>a</mi><mi>x</mi><mi>I</mi><mi>t</mi><mi>e</mi><mi>r</mi></mrow></msub></semantics></math></inline-formula>; given the stochastic nature of both methods, repeatability is also addressed. Finally, the computational effort required for their implementation is considered. …”
    Get full text
    Article
  5. 24805

    Transforaminal lumbar interbody fusion (TLIF) surgery: A finite element analysis of open and minimally invasive approach on L4-L5 segment by Kishore Pradeep, Bidyut Pal, Kaushik Mukherjee, Gautam M. Shetty

    Published 2025-01-01
    “…Background: To compare the effect of minimally invasive and open transforaminal lumbar interbody fusion (TLIF) approaches in fusing the L4-L5 segment and predicting the potential risk of adjacent segment degeneration (ASD). Methods: A computed tomography scan image was processed and the three-dimensional model of the L1-L5 spine was reconstructed. …”
    Get full text
    Article
  6. 24806

    Large-scale S-box design and analysis of SPS structure by Lan ZHANG, Liangsheng HE, Bin YU

    Published 2023-02-01
    “…A class of optimal linear transformation P over a finite field<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msup> <mrow> <mrow><mo>(</mo> <mrow> <msubsup> <mi>F</mi> <mn>2</mn> <mi>m</mi> </msubsup> </mrow> <mo>)</mo></mrow></mrow> <mn>4</mn> </msup> </mrow></math></inline-formula> was constructed based on cyclic shift and XOR operation.Using the idea of inverse proof of input-output relation of linear transformation for reference, a proof method was put forward that transformed the objective problem of optimal linear transformation into several theorems of progressive relation, which not only solved the proof of that kind of optimal linear transformation, but also was suitable for the proof of any linear transformation.By means of small-scale S-box and optimal cyclic shift-XOR linear transformation P, a large-scale S-box model with 2-round SPS structure was established, and a series of lightweight large-scale S-boxes with good cryptographic properties were designed.Only three kind of basic operations such as look-up table, cyclic shift and XOR were used in the proposed design scheme, which improved the linearity and difference uniformity of large-scale S-boxes.Theoretical proof and case analysis show that, compared with the existing large-scale S-box construction methods, the proposed large-scale S-box design scheme has lower computational cost and better cryptographic properties such as difference and linearity, which is suitable for the design of nonlinear permutation coding of lightweight cryptographic algorithms.…”
    Get full text
    Article
  7. 24807

    Addressing Data Imbalance in Crash Data: Evaluating Generative Adversarial Network&#x2019;s Efficacy Against Conventional Methods by Bei Zhou, Qianxi Zhou, Zongzhi Li

    Published 2025-01-01
    “…Given the significantly lower computational resources required by cost-sensitive learning, this approach is recommended for handling imbalanced injury severity data.…”
    Get full text
    Article
  8. 24808

    Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability by Yuanyuan Ma, Lingxuan Li

    Published 2018-01-01
    “…Then, the numerical computation method is successfully used to analyze the crisis spreading in the networks when the networks meet random failures or intentional attacks. …”
    Get full text
    Article
  9. 24809

    Concurrent Viewing of H&E and Multiplex Immunohistochemistry in Clinical Specimens by Larry E. Morrison, Tania M. Larrinaga, Brian D. Kelly, Mark R. Lefever, Rachel C. Beck, Daniel R. Bauer

    Published 2025-01-01
    “…Using this approach, conventional H&E staining could be simultaneously viewed in color on a computer monitor alongside a monochrome video of the invisible IHC staining, while manually scanning the specimen. …”
    Get full text
    Article
  10. 24810

    Challenges in Diagnosis and Management of Altered Mental Status in the Setting of Urosepsis and Hydrocephalus Secondary to an Occlusive Cyst of the Fourth Ventricle: A Case Report by Matthew Van Ligten, Miles Hudson, Jonathon J. Parker, Wayne A. Martini

    Published 2025-01-01
    “…Brain imaging, including magnetic resonance imaging (MRI) and computed tomography (CT), facilitated the diagnosis, suggesting hydrocephalus with downward tonsillar herniation. …”
    Get full text
    Article
  11. 24811

    Facies-Constrained Kriging Interpolation Method for Parameter Modeling by Zhenbo Nie, Bo Feng, Huazhong Wang, Chengliang Wu, Rongwei Xu, Chao Ning

    Published 2024-12-01
    “…Furthermore, the FC-Kriging method does not introduce additional computational complexity, making it convenient to implement in a 3D situation. …”
    Get full text
    Article
  12. 24812

    Can the new model of shared property rights promote better corporate financial performance in China? by Zihao Ma, Shuaishuai Zhang, Xiao Li, Jiahong Guo, Lidan Yang, Shixiong Cao

    Published 2025-02-01
    “…The strength of the incentive was greater for core technical staff than for senior executives, suggesting that scientists, engineers, and computer programmers should be the targets of a shared property rights incentive program. …”
    Get full text
    Article
  13. 24813

    A multimodal multistream multilevel fusion network for finger joint angle estimation with hybrid sEMG and FMG sensing by Zhouping Chen, Mohamed Amin Gouda, Longcheng Ji, Hong Wang

    Published 2025-01-01
    “…The experimental results suggest that the MMMFNet has higher estimation accuracy (RMSE: 6.225±0.276 vs. 6.953±0.282, R2: 0.879±0.019 vs 0.846±0.021), shorter training time (4.146±0.074 min vs. 16.536±0.430 min), and lower computational complexity (5.4×106 FLOPs vs 8.8×106 FLOPs) than state-of-the-art fusion methods. …”
    Get full text
    Article
  14. 24814

    3D Fusion Framework for Infarction and Angiogenesis Analysis in a Myocardial Infarct Minipig Model by Xu Zhenzhen PhD, Bo Tao PhD, MD, Yu Li MSc, Jun Zhang PhD, Xiaochao Qu PhD, Feng Cao PhD, Jimin Liang PhD

    Published 2017-05-01
    “…In this study, a 3D fusion framework is designed to integrate coronary computed tomography (CT) angiography (CTA), 2-deoxy-2-[ 18 F]fluoro-D-glucose ([ 18 F]DG) positron emission tomography (PET)/CT, and [ 68 Ga]-1,4,7-triazacyclononane-1,4,7-triacetic acid-(Arg-Gly-Asp)2 ([ 68 Ga]-NOTA-PRGD2) PET/CT images of the myocardial infarction model in minipigs. …”
    Get full text
    Article
  15. 24815

    Multiple Levels of Letter Representation in Written Spelling: Evidence From a Single Case of Dysgraphia with Multiple Deficits by Marie-Pierre de Partz, Aliette Lochy, Agnesa Pillon

    Published 2005-01-01
    “…We argue that these contrasting patterns of letter error distribution result from damage to two distinct levels of letter representation and processing within the spelling system, namely, the amodal graphemic representation held in the graphemic buffer and the letter form representation computed by subsequent writing-specific processes. …”
    Get full text
    Article
  16. 24816

    Numerical Simulation of Turbulent Fluid Flow and Heat Transfer in a Ribbed Rotating Two-Pass Square Duct by Liou Tong-Miin, Chen Shih-Hui, Li Yi-Chen

    Published 2005-01-01
    “…<p>The local turbulent fluid flow and heat transfer in a rotating two-pass square duct with 19 pairs of in-line <math alttext="$90^{circ}$"><msup><mn>90</mn> <mo>&compfn;</mo> </msup> </math> ribs have been investigated computationally. A Reynolds-averaged Navier-Stokes equation (RANS) with a two-layer <math alttext="${k}-varepsilon$"><mi>k</mi> <mo>&minus;</mo> <mi>&varepsilon;</mi> </math> turbulence model was solved. …”
    Get full text
    Article
  17. 24817

    A rare case of temporal arteritis in a young Indian male by Debaditya Roy, Susmita Rakshit, Azeez Pasha, Abhishek Patil

    Published 2023-01-01
    “…Surrounding areas showed minimal inflammatory changes which were further reconfirmed by computed tomography. Left temporal artery biopsy showed thickening of the tunica media and adventitia with the fragmentation of the internal elastic membrane. …”
    Get full text
    Article
  18. 24818

    Rapid estimation method of lithium battery state of health based on novel health feature by DONG Xiaohong, DONG Jinbo, WANG Mingshen, ZENG Fei, PAN Yi

    Published 2025-01-01
    “…Most data-driven lithium battery SOH estimation methods are computationally intensive and difficult to use in real-time in battery management system microcontrollers. …”
    Get full text
    Article
  19. 24819

    Association of systemic immune-inflammation index with all-cause and cardiovascular mortality among adults with depression: evidence from NHANES 2005–2018 by Xinping Yu, Heqing Zheng, Mingxu Liu, Lanxiang Wu, Sheng Tian, Wei Wu

    Published 2025-01-01
    “…Cox proportional hazards regression models to compute hazard ratios (HR) and 95% confidence intervals (CI) for mortality.The restricted cubic spline(RCS), Kaplan-Meier curve analysis, time-dependent ROC analysis, subgroup and sensitivity analyses were also used. …”
    Get full text
    Article
  20. 24820

    Proven secure blind adaptor signature scheme based on the SM2 by HU Xiaoming, CHEN Haichan

    Published 2024-04-01
    “…Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. …”
    Get full text
    Article