Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
7681
-
7682
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
7683
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
7684
-
7685
Multi-Modal Comparative Analysis on Audio Dub Detection Using Artificial Intelligence
Published 2025-01-01Get full text
Article -
7686
Analyzing Data Incompleteness for MRI Data for Quality Enhancement
Published 2024-01-01Get full text
Article -
7687
TRANSFORMATIVE TECHNOLOGIES
Published 2024-07-01“…This reflection explores the integration of artificial intelligence (AI) and advanced visualisation techniques within computer-assisted qualitative data analysis software (CAQDAS) tools. …”
Get full text
Article -
7688
-
7689
Machine learning algorithms for manufacturing quality assurance: A systematic review of performance metrics and applications
Published 2025-07-01“…Performance metrics include accuracy, precision, speed, recall, computational efficiency, scalability, and real-time processing capabilities. …”
Get full text
Article -
7690
Interval-based principal component analysis for reliable fault detection under data uncertainty
Published 2025-09-01“…Principal Component Analysis (PCA) has gained widespread use in industrial process monitoring due to its ability to model high-dimensional data and detect abnormal events. …”
Get full text
Article -
7691
Innovative and Interactive Technologies in Creative Product Design Education: A Review
Published 2024-12-01“…The findings highlight several categories of technologies utilized in design education, including virtual and augmented reality, robotics, interactive embedded systems, immersive technologies, and computational intelligence systems. These technologies are primarily integrated as supportive tools throughout different stages of the design process within learning environments. …”
Get full text
Article -
7692
A Multicriteria Evaluation of Single Underwater Image Improvement Algorithms
Published 2025-07-01“…For this research’s target application of generating underwater photomosaics, the Dark Channel Prior (DCP) algorithm emerged as the most suitable under a weighting scheme of 75% for processing time and 25% for keypoint increase. This proposal represents a solution for evaluating improvement algorithms in applications where computational efficiency is critical.…”
Get full text
Article -
7693
-
7694
Adaptive Spatial Lattice Manufacturing (ASLM): A novel approach to efficient lattice structure production
Published 2025-01-01“…This paper introduces the ASLM process, detailing its computational design principles, build mechanics, and material compatibility using AISI 316L stainless steel. …”
Get full text
Article -
7695
Editorial: Large Language Models for medical applications
Published 2025-05-01Get full text
Article -
7696
Error Analysis of Trigonometry Students in a Technological University
Published 2016-06-01“…Thus, students had learned some concepts defectively. Generally, processing the error of the students needs teachers' consideration through process-focus instruction. …”
Get full text
Article -
7697
Parametric Analytical Modulation Transfer Function Model in Turbid Atmosphere with Application to Image Restoration
Published 2024-10-01“…This approach represents a novel solution to the challenges of image processing in complex atmospheric environments.…”
Get full text
Article -
7698
Nanosilicates and molecular silicate dust species: properties and observational prospects
Published 2024-12-01Get full text
Article -
7699
The potential of artificial intelligence (AI) to improve electronic word-of-mouth's (eWOM) efficacy
Published 2024-01-01“…Opinion mining, (sentiment analysis), is a popular subdomain in Natural language processing (NLP) which allows for transforming qualitative data into quantitative information. …”
Get full text
Article -
7700
Bilateral Olecranon and Left Lesser Trochanter Avulsion Fractures in Renal Osteodystrophy: A Rare Case Report and Comprehensive Review
Published 2025-07-01“…This review summarizes the role of imaging (Radiography, US, Computed Tomography, and Magnetic Resonance Imaging) in assessing avulsion fractures in patients with end-stage renal disease. …”
Get full text
Article