Showing 7,001 - 7,020 results of 10,771 for search 'Big3~', query time: 1.16s Refine Results
  1. 7001

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  2. 7002

    Establishment and application of a one-step multiplex real-time PCR assay for detection of A, B, and C subtypes of avian metapneumovirus by Mingjun Su, Jiongze Cheng, Xiangwen Xu, Yijia Liu, Yulin Zhao, Yutao Wang, Xiaoxu Du, Jiale Ying, Junfang Yan, Huihua Zheng, Changyong Cheng, Jing Sun

    Published 2025-01-01
    “…Avian metapneumovirus (aMPV) represents a significant threat to the poultry industry, exhibiting a high degree of genetic diversity. Of these, the aMPV types A (aMPV-A), B (aMPV-B) and C (aMPV-C) are frequently detected in Chinese waterfowl and live poultry markets. …”
    Get full text
    Article
  3. 7003

    Pagidarì, Adébáyọ̀FálétìRe’lé Poo! by Báyọ̀ Ọmọlọlá

    Published 2021-12-01
    “…Ẹ̀lirí ́ ki ́ i ́ bẹ́ si ́lẹ ká gbọ́ ‘ji à ’rẹ̀ ̀ bi ́ tẹran tó tóbi. ́ Igi ńlá ojúlowo ́ ́ ọmọ Yoruba ̀ ́ kan tó t’òdé Ọyọ̀ ́ wá derin tó gòke ̀ àlọ! ̀ …”
    Get full text
    Article
  4. 7004

    Terrorismo extremo e os tensionamentos nas democracias by Hugo Arend

    Published 2005-01-01
    “…What are the peculiarities of this new extreme terrorism and how are they related to the construction of big cities? How can we relate the conflicts that emerge in the midst of big cities after terrorist attacks and the problems faced by Western democracies? …”
    Get full text
    Article
  5. 7005
  6. 7006
  7. 7007
  8. 7008

    A 3D Dual Encoder Mirror Difference ResU-Net for Multimodal Brain Tumor Segmentation by Qiwei Xing, Zhihua Li, Yongxia Jing, Xiaolin Chen

    Published 2025-01-01
    “…Brain tumors are characterized by their relatively high incidence and mortality rates, highlighting the utmost importance of precise automatic segmentation for subsequent diagnosis and treatment. …”
    Get full text
    Article
  9. 7009

    GPS Trajectory-Based Spatio-Temporal Variations of Traffic Accessibility under Public Health Emergency Consideration by Luqi Dong, Ying Lv, Huijun Sun, Danyue Zhi, Tingting Chen

    Published 2021-01-01
    “…Moreover, the result of residents’ accessibility to the designated hospitals presents a pattern of high-value aggregation in the arterial road neighborhood. …”
    Get full text
    Article
  10. 7010
  11. 7011

    Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG

    Published 2016-04-01
    “…Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.…”
    Get full text
    Article
  12. 7012
  13. 7013

    Editor's Note by Robyn Williams, Lisa Otto

    Published 2022-02-01
    “…New and advancing technologies such as artificial intelligence, big data and the Internet of Things have injected themselves in big and small ways in various aspects of daily life. …”
    Get full text
    Article
  14. 7014
  15. 7015

    Researcb on Precision Marketing Metbod Based on Data-Driven in Telecom Industry by Qing Zhang, Ping Huang

    Published 2014-07-01
    “…In the background of the mobile internet, along with the big data technology development and customer demand individuation, customer experience requirements is increasing, including high real-time and high accuracy of customer needs. …”
    Get full text
    Article
  16. 7016

    High-resolution Observations of an X-1.0 White-light Flare with Moving Flare Ribbons by Xu Yang, Meiqi Wang, Andrew Cao, Kaifan Ji, Vasyl Yurchyshyn, Jiong Qiu, Sijie Yu, Jinhua Shen, Wenda Cao

    Published 2025-01-01
    “…We analyze high-resolution observations of an X-1.0 white-light flare, triggered by a filament eruption, on 2022 October 2. …”
    Get full text
    Article
  17. 7017
  18. 7018
  19. 7019

    Condition monitoring and multi-fault classification of hydraulic systems using multivariate functional data analysis by Cevahir Yildirim, Alba M. Franco-Pereira, Rosa E. Lillo

    Published 2025-01-01
    “…The fault diagnosis of complex nonlinear systems, such as hydraulic systems, has become increasingly important due to advancements in big data analytics, machine learning (ML), Industry 4.0, and Internet of Things (IoT) applications. …”
    Get full text
    Article
  20. 7020