Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12981
The Effectiveness and Clinical Usability of a Handheld Information Appliance
Published 2012-01-01“…This study was designed to gain a deeper understanding of clinicians’ interactions with a mobile clinical computing appliance (Motion Computing C5) designed to consolidate numerous technological functions into an all-in-one device. …”
Get full text
Article -
12982
-
12983
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
12984
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
12985
A Multimodal Dataset of Cardiac, Electrodermal, and Environmental Signals
Published 2025-05-01Get full text
Article -
12986
A Comprehensive Data Maturity Model for Data Pre-Analysis
Published 2025-04-01Get full text
Article -
12987
Enforcing interface field continuity to advance finite element approximations in heterogeneous materials
Published 2024-11-01Get full text
Article -
12988
Cloud–Edge Collaborative Model Adaptation Based on Deep Q-Network and Transfer Feature Extraction
Published 2025-07-01“…With the rapid development of smart devices and the Internet of Things (IoT), the explosive growth of data has placed increasingly higher demands on real-time processing and intelligent decision making. Cloud-edge collaborative computing has emerged as a mainstream architecture to address these challenges. …”
Get full text
Article -
12989
Parallel Methods and Higher Dimensional NLS Equations
Published 2013-01-01“…These schemes are very well suited for parallel implementation on a high performance system with many processors due to the nature of the computation that involves solving the same block tridiagonal systems with many right hand sides. …”
Get full text
Article -
12990
Load Balancer Operation Analyses of Video-Conference Service
Published 2022-09-01“…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. …”
Get full text
Article -
12991
-
12992
MFF-Net: A Lightweight Multi-Frequency Network for Measuring Heart Rhythm from Facial Videos
Published 2024-12-01“…The SSA-module can help a signal reconstruction network locate the obvious inferior parts in the reconstruction process so as to make better decisions when merging multi-dimensional signals. …”
Get full text
Article -
12993
On the optimal layout of (K p − C p ) n into grid and certain structures
Published 2025-05-01“…Abstract Interconnection networks constitute complex configurations of processors and communication links that facilitate data transmission between processors in a parallel computing system. …”
Get full text
Article -
12994
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01“…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
Get full text
Article -
12995
COM-MABs: From Users' Feedback to Recommendation
Published 2022-05-01“…On the study of those strategies, this paper present three contributions: 1) We model a feedback strategy as a three-step process, where each step influences the performances of an agent ; 2) Based on this model, we propose a novel Reward Computing process, BUSBC, which significantly increases the global accuracy reached by optimistic COM-MAB algorithms -- up to 16.2\% -- ; 3) We conduct an empirical analysis of our approach and several feedback strategies from the literature on three real-world application datasets, confirming our propositions.…”
Get full text
Article -
12996
Survey of video behavior recognition
Published 2018-06-01“…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
Get full text
Article -
12997
-
12998
A comprehensive dataset of United States federal procurement from 1979 to 2023
Published 2025-08-01Get full text
Article -
12999
Data harmonization for the analysis of personalized treatment of psychosis with metacognitive training
Published 2025-03-01Get full text
Article -
13000
Anterior Cruciate Ligament (ACL) Tear Detection Using Hybrid CNN Transformer
Published 2025-01-01Get full text
Article