Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24801
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
24802
Effect of short basalt fibers on energy-dissipating properties of lightweight rubberized concrete shear wall
Published 2024-09-01“…Scanning electron microscopy and computer tomography were used to validate the material's inner structure, adhesion, crumb rubber and basalt fiber distribution. …”
Get full text
Article -
24803
Integrated AutoML-based framework for optimizing shale gas production: A case study of the Fuling shale gas field
Published 2025-03-01“…To demystify the “black-box” nature of the ensemble model, KernelSHAP, a kernel-based approach to compute Shapley values, is utilized for elucidating the influential factors that affect shale gas production at both global and local scales. …”
Get full text
Article -
24804
Nature–Inspired Metaheuristic Optimization for Control Tuning of Complex Systems
Published 2024-12-01“…The performance of the ALO and WOA techniques for the tuning of conventional PID controllers is evaluated in relation to the number of agents <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mi>S</mi></msub></semantics></math></inline-formula> and the maximum number of iterations <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mrow><mi>M</mi><mi>a</mi><mi>x</mi><mi>I</mi><mi>t</mi><mi>e</mi><mi>r</mi></mrow></msub></semantics></math></inline-formula>; given the stochastic nature of both methods, repeatability is also addressed. Finally, the computational effort required for their implementation is considered. …”
Get full text
Article -
24805
Transforaminal lumbar interbody fusion (TLIF) surgery: A finite element analysis of open and minimally invasive approach on L4-L5 segment
Published 2025-01-01“…Background: To compare the effect of minimally invasive and open transforaminal lumbar interbody fusion (TLIF) approaches in fusing the L4-L5 segment and predicting the potential risk of adjacent segment degeneration (ASD). Methods: A computed tomography scan image was processed and the three-dimensional model of the L1-L5 spine was reconstructed. …”
Get full text
Article -
24806
Large-scale S-box design and analysis of SPS structure
Published 2023-02-01“…A class of optimal linear transformation P over a finite field<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msup> <mrow> <mrow><mo>(</mo> <mrow> <msubsup> <mi>F</mi> <mn>2</mn> <mi>m</mi> </msubsup> </mrow> <mo>)</mo></mrow></mrow> <mn>4</mn> </msup> </mrow></math></inline-formula> was constructed based on cyclic shift and XOR operation.Using the idea of inverse proof of input-output relation of linear transformation for reference, a proof method was put forward that transformed the objective problem of optimal linear transformation into several theorems of progressive relation, which not only solved the proof of that kind of optimal linear transformation, but also was suitable for the proof of any linear transformation.By means of small-scale S-box and optimal cyclic shift-XOR linear transformation P, a large-scale S-box model with 2-round SPS structure was established, and a series of lightweight large-scale S-boxes with good cryptographic properties were designed.Only three kind of basic operations such as look-up table, cyclic shift and XOR were used in the proposed design scheme, which improved the linearity and difference uniformity of large-scale S-boxes.Theoretical proof and case analysis show that, compared with the existing large-scale S-box construction methods, the proposed large-scale S-box design scheme has lower computational cost and better cryptographic properties such as difference and linearity, which is suitable for the design of nonlinear permutation coding of lightweight cryptographic algorithms.…”
Get full text
Article -
24807
Addressing Data Imbalance in Crash Data: Evaluating Generative Adversarial Network’s Efficacy Against Conventional Methods
Published 2025-01-01“…Given the significantly lower computational resources required by cost-sensitive learning, this approach is recommended for handling imbalanced injury severity data.…”
Get full text
Article -
24808
Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability
Published 2018-01-01“…Then, the numerical computation method is successfully used to analyze the crisis spreading in the networks when the networks meet random failures or intentional attacks. …”
Get full text
Article -
24809
Concurrent Viewing of H&E and Multiplex Immunohistochemistry in Clinical Specimens
Published 2025-01-01“…Using this approach, conventional H&E staining could be simultaneously viewed in color on a computer monitor alongside a monochrome video of the invisible IHC staining, while manually scanning the specimen. …”
Get full text
Article -
24810
Challenges in Diagnosis and Management of Altered Mental Status in the Setting of Urosepsis and Hydrocephalus Secondary to an Occlusive Cyst of the Fourth Ventricle: A Case Report
Published 2025-01-01“…Brain imaging, including magnetic resonance imaging (MRI) and computed tomography (CT), facilitated the diagnosis, suggesting hydrocephalus with downward tonsillar herniation. …”
Get full text
Article -
24811
Facies-Constrained Kriging Interpolation Method for Parameter Modeling
Published 2024-12-01“…Furthermore, the FC-Kriging method does not introduce additional computational complexity, making it convenient to implement in a 3D situation. …”
Get full text
Article -
24812
Can the new model of shared property rights promote better corporate financial performance in China?
Published 2025-02-01“…The strength of the incentive was greater for core technical staff than for senior executives, suggesting that scientists, engineers, and computer programmers should be the targets of a shared property rights incentive program. …”
Get full text
Article -
24813
A multimodal multistream multilevel fusion network for finger joint angle estimation with hybrid sEMG and FMG sensing
Published 2025-01-01“…The experimental results suggest that the MMMFNet has higher estimation accuracy (RMSE: 6.225±0.276 vs. 6.953±0.282, R2: 0.879±0.019 vs 0.846±0.021), shorter training time (4.146±0.074 min vs. 16.536±0.430 min), and lower computational complexity (5.4×106 FLOPs vs 8.8×106 FLOPs) than state-of-the-art fusion methods. …”
Get full text
Article -
24814
3D Fusion Framework for Infarction and Angiogenesis Analysis in a Myocardial Infarct Minipig Model
Published 2017-05-01“…In this study, a 3D fusion framework is designed to integrate coronary computed tomography (CT) angiography (CTA), 2-deoxy-2-[ 18 F]fluoro-D-glucose ([ 18 F]DG) positron emission tomography (PET)/CT, and [ 68 Ga]-1,4,7-triazacyclononane-1,4,7-triacetic acid-(Arg-Gly-Asp)2 ([ 68 Ga]-NOTA-PRGD2) PET/CT images of the myocardial infarction model in minipigs. …”
Get full text
Article -
24815
Multiple Levels of Letter Representation in Written Spelling: Evidence From a Single Case of Dysgraphia with Multiple Deficits
Published 2005-01-01“…We argue that these contrasting patterns of letter error distribution result from damage to two distinct levels of letter representation and processing within the spelling system, namely, the amodal graphemic representation held in the graphemic buffer and the letter form representation computed by subsequent writing-specific processes. …”
Get full text
Article -
24816
Numerical Simulation of Turbulent Fluid Flow and Heat Transfer in a Ribbed Rotating Two-Pass Square Duct
Published 2005-01-01“…<p>The local turbulent fluid flow and heat transfer in a rotating two-pass square duct with 19 pairs of in-line <math alttext="$90^{circ}$"><msup><mn>90</mn> <mo>∘</mo> </msup> </math> ribs have been investigated computationally. A Reynolds-averaged Navier-Stokes equation (RANS) with a two-layer <math alttext="${k}-varepsilon$"><mi>k</mi> <mo>−</mo> <mi>ϵ</mi> </math> turbulence model was solved. …”
Get full text
Article -
24817
A rare case of temporal arteritis in a young Indian male
Published 2023-01-01“…Surrounding areas showed minimal inflammatory changes which were further reconfirmed by computed tomography. Left temporal artery biopsy showed thickening of the tunica media and adventitia with the fragmentation of the internal elastic membrane. …”
Get full text
Article -
24818
Rapid estimation method of lithium battery state of health based on novel health feature
Published 2025-01-01“…Most data-driven lithium battery SOH estimation methods are computationally intensive and difficult to use in real-time in battery management system microcontrollers. …”
Get full text
Article -
24819
Association of systemic immune-inflammation index with all-cause and cardiovascular mortality among adults with depression: evidence from NHANES 2005–2018
Published 2025-01-01“…Cox proportional hazards regression models to compute hazard ratios (HR) and 95% confidence intervals (CI) for mortality.The restricted cubic spline(RCS), Kaplan-Meier curve analysis, time-dependent ROC analysis, subgroup and sensitivity analyses were also used. …”
Get full text
Article -
24820
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. …”
Get full text
Article