Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
7001
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
7002
Establishment and application of a one-step multiplex real-time PCR assay for detection of A, B, and C subtypes of avian metapneumovirus
Published 2025-01-01“…Avian metapneumovirus (aMPV) represents a significant threat to the poultry industry, exhibiting a high degree of genetic diversity. Of these, the aMPV types A (aMPV-A), B (aMPV-B) and C (aMPV-C) are frequently detected in Chinese waterfowl and live poultry markets. …”
Get full text
Article -
7003
Pagidarì, Adébáyọ̀FálétìRe’lé Poo!
Published 2021-12-01“…Ẹ̀lirí ́ ki ́ i ́ bẹ́ si ́lẹ ká gbọ́ ‘ji à ’rẹ̀ ̀ bi ́ tẹran tó tóbi. ́ Igi ńlá ojúlowo ́ ́ ọmọ Yoruba ̀ ́ kan tó t’òdé Ọyọ̀ ́ wá derin tó gòke ̀ àlọ! ̀ …”
Get full text
Article -
7004
Terrorismo extremo e os tensionamentos nas democracias
Published 2005-01-01“…What are the peculiarities of this new extreme terrorism and how are they related to the construction of big cities? How can we relate the conflicts that emerge in the midst of big cities after terrorist attacks and the problems faced by Western democracies? …”
Get full text
Article -
7005
A scientometric visualization analysis of the gut microbiota and gestational diabetes mellitus
Published 2025-01-01Get full text
Article -
7006
-
7007
An Estimation Model on Electricity Consumption of New Metro Stations
Published 2020-01-01Get full text
Article -
7008
A 3D Dual Encoder Mirror Difference ResU-Net for Multimodal Brain Tumor Segmentation
Published 2025-01-01“…Brain tumors are characterized by their relatively high incidence and mortality rates, highlighting the utmost importance of precise automatic segmentation for subsequent diagnosis and treatment. …”
Get full text
Article -
7009
GPS Trajectory-Based Spatio-Temporal Variations of Traffic Accessibility under Public Health Emergency Consideration
Published 2021-01-01“…Moreover, the result of residents’ accessibility to the designated hospitals presents a pattern of high-value aggregation in the arterial road neighborhood. …”
Get full text
Article -
7010
-
7011
Privacy computing:concept, connotation and its research trend
Published 2016-04-01“…Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.…”
Get full text
Article -
7012
Active Disturbance Rejection Synchronization of Morris-Lecar Neurons
Published 2018-01-01Get full text
Article -
7013
Editor's Note
Published 2022-02-01“…New and advancing technologies such as artificial intelligence, big data and the Internet of Things have injected themselves in big and small ways in various aspects of daily life. …”
Get full text
Article -
7014
Global attractivity of a rational difference equation with higher order and its applications
Published 2024-07-01Get full text
Article -
7015
Researcb on Precision Marketing Metbod Based on Data-Driven in Telecom Industry
Published 2014-07-01“…In the background of the mobile internet, along with the big data technology development and customer demand individuation, customer experience requirements is increasing, including high real-time and high accuracy of customer needs. …”
Get full text
Article -
7016
High-resolution Observations of an X-1.0 White-light Flare with Moving Flare Ribbons
Published 2025-01-01“…We analyze high-resolution observations of an X-1.0 white-light flare, triggered by a filament eruption, on 2022 October 2. …”
Get full text
Article -
7017
-
7018
Evaluating the Performance of a Static Patching Strategy against Computer Viruses
Published 2020-01-01Get full text
Article -
7019
Condition monitoring and multi-fault classification of hydraulic systems using multivariate functional data analysis
Published 2025-01-01“…The fault diagnosis of complex nonlinear systems, such as hydraulic systems, has become increasingly important due to advancements in big data analytics, machine learning (ML), Industry 4.0, and Internet of Things (IoT) applications. …”
Get full text
Article -
7020
Blind Corner Propagation Model for IEEE 802.11p Communication in Network Simulators
Published 2018-01-01Get full text
Article