Showing 54,581 - 54,600 results of 56,283 for search 'Computex~', query time: 2.61s Refine Results
  1. 54581

    Quasi-3D model to simulate flow in straight channels within vegetation patches by Sahat Maruli Simanjuntak Yogi, Uchida Tatsuhiko

    Published 2025-01-01
    “…In this paper, we conducted a comparative analysis between the Bottom Velocity Computation (BVC) method for quasi-three-dimensional models, which is the enhanced depth-integrated model with sub-grid three-dimensional model, conventional two-dimensional model, and three-dimensional model to explore the three-dimensional (3D) flow effects induced by the presence of vegetation patches. …”
    Get full text
    Article
  2. 54582

    A Unique Trinucleotide-Bloc Mutation-Based Two SARS-CoV-2 Genotypes with Potential Pathogenic Impacts by Mustak Ibn Ayub

    Published 2022-01-01
    “…By analyzing more than 3000 high-coverage, complete sequences deposited in the GISAID database up to April 2020, here I report the uniqueness of the 28881–28883: GGG > AAC trinucleotide-bloc mutation in the SARS-CoV-2 genome that results in two substrains, described here as SARS-CoV-2g (28881–28883: GGG genotype) and SARS-CoV-2a (28881–28883: AAC genotype). Computational analysis and literature review suggest that this bloc mutation would bring 203–204: RG (arginine-glycine)>KR (lysine-arginine) amino acid changes in the nucleocapsid (N) protein affecting the SR (serine-arginine)-rich motif of the protein, a critical region for the transcription of viral RNA and replication of the virus. …”
    Get full text
    Article
  3. 54583

    How to Improve the Science and Engineering Education in Islamic Countries? by Zekai Şen

    Published 2018-12-01
    “…It is emphasized that the higher education and scientific research should have philosophy, logic, geometry and natural event visualizations prior to mathematical and computational calculations in engineering education.…”
    Get full text
    Article
  4. 54584

    Modern trends of digitalization of innovation process by E. N. Bykovskaya, G. P. Kharchilava, Yu. N. Kafiyatullina

    Published 2018-03-01
    “…Modern information technologies are characterized by high computing power, they take control of the organization, production, creation of innovations to a fundamentally different quality level.Currently, the success of competition is determined by the ability of organizations to quickly implement and commercialize innovations and obtain superprofits, in this regard it seems relevant to explore the possibilities of digital solutions and technologies for the effective management and management of innovation.The article analyzes the current state of the information technology industry and the information and communication technologies industry, on the basis of which the problems of the industry development have been identified, and proposals have been developed to use digital products to stimulate the innovation process.…”
    Get full text
    Article
  5. 54585

    The reaction of the social security systems of the European Union and the united states of America to financial crises: proposals for using the experience in Russia by V. A. Kalabin

    Published 2024-11-01
    “…When conducting the study, the following methods have been used: analysis, induction, measurement, comparison, computational and constructive, statistical and economic. …”
    Get full text
    Article
  6. 54586
  7. 54587
  8. 54588
  9. 54589
  10. 54590

    Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU

    Published 2023-10-01
    “…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
    Get full text
    Article
  11. 54591
  12. 54592

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  13. 54593
  14. 54594

    Next decade of telecommunications artificial intelligence by Ye OUYANG, Lilei WANG, Aidong YANG, Maulik SHAH, David BELANGER, Tongqing GAO, Leping WEI, Yaqin ZHANG

    Published 2021-03-01
    “…It has been an exciting journey since the mobile communications and AI were conceived 37 years and 64 years ago.While both fields evolved independently and profoundly changed communications and computing industries, the rapid convergence of 5G and AI is beginning to significantly transform the core communication infrastructure, network management and vertical applications.The individual roadmaps of mobile communications and artificial intelligence in the early stage were firstly outlined, with a concentration to review the era from 3G to 5G when AI and mobile communications started to converge.With regard to telecommunications artificial intelligence, the progress of AI in the ecosystem of mobile communications was further introduced in detail, including network infrastructure, network operation and management, business operation and management, intelligent applications towards BSS & OSS convergence, verticals and private networks etc.Then the classifications of AI in telecom ecosystems were summarized along with its evolution paths specified by various international telecommunications standardization bodies.Towards the next decade, the prospective roadmap of telecommunications artificial intelligence was forecasted.In line with 3GPP and ITU-R’s timeline of 5G & 6G, the network intelligence following 3GPP and O-RAN routes, experience and intention driven network management and operation, network AI signaling system, intelligent middle-office based BSS, intelligent customer experience management and policy control driven by BSS& OSS convergence, evolution from SLA to ELA, and intelligent private network for verticals were further explored.It concludes that with the vision AI will reshape the future B5G/6G landscape, and we need fully take the unprecedented opportunities.…”
    Get full text
    Article
  15. 54595

    Large-scale S-box design and analysis of SPS structure by Lan ZHANG, Liangsheng HE, Bin YU

    Published 2023-02-01
    “…A class of optimal linear transformation P over a finite field<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msup> <mrow> <mrow><mo>(</mo> <mrow> <msubsup> <mi>F</mi> <mn>2</mn> <mi>m</mi> </msubsup> </mrow> <mo>)</mo></mrow></mrow> <mn>4</mn> </msup> </mrow></math></inline-formula> was constructed based on cyclic shift and XOR operation.Using the idea of inverse proof of input-output relation of linear transformation for reference, a proof method was put forward that transformed the objective problem of optimal linear transformation into several theorems of progressive relation, which not only solved the proof of that kind of optimal linear transformation, but also was suitable for the proof of any linear transformation.By means of small-scale S-box and optimal cyclic shift-XOR linear transformation P, a large-scale S-box model with 2-round SPS structure was established, and a series of lightweight large-scale S-boxes with good cryptographic properties were designed.Only three kind of basic operations such as look-up table, cyclic shift and XOR were used in the proposed design scheme, which improved the linearity and difference uniformity of large-scale S-boxes.Theoretical proof and case analysis show that, compared with the existing large-scale S-box construction methods, the proposed large-scale S-box design scheme has lower computational cost and better cryptographic properties such as difference and linearity, which is suitable for the design of nonlinear permutation coding of lightweight cryptographic algorithms.…”
    Get full text
    Article
  16. 54596

    Numerical Simulation of Turbulent Fluid Flow and Heat Transfer in a Ribbed Rotating Two-Pass Square Duct by Liou Tong-Miin, Chen Shih-Hui, Li Yi-Chen

    Published 2005-01-01
    “…<p>The local turbulent fluid flow and heat transfer in a rotating two-pass square duct with 19 pairs of in-line <math alttext="$90^{circ}$"><msup><mn>90</mn> <mo>&compfn;</mo> </msup> </math> ribs have been investigated computationally. A Reynolds-averaged Navier-Stokes equation (RANS) with a two-layer <math alttext="${k}-varepsilon$"><mi>k</mi> <mo>&minus;</mo> <mi>&varepsilon;</mi> </math> turbulence model was solved. …”
    Get full text
    Article
  17. 54597
  18. 54598

    Numerical Calculation of Fracture Seepage in Rough Rock and Analysis of Local Pressure Drop by Gang Chen, Ling Ma, Hongsheng Gong, Fengqiang Luo

    Published 2021-01-01
    “…The Navier-Stokes (NS) equation can be solved directly for the seepage flow in rock fractures with good accuracy, but there are problems of large computational volume and slow solution speed. In this paper, the fracture aperture space data is substituted into the local cubic law as an aperture function to form a numerical calculation method for seepage in rough rock fractures, namely, the aperture function method (AFM). …”
    Get full text
    Article
  19. 54599

    Proven secure blind adaptor signature scheme based on the SM2 by HU Xiaoming, CHEN Haichan

    Published 2024-04-01
    “…Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. …”
    Get full text
    Article
  20. 54600

    getphylo: rapid and automatic generation of multi-locus phylogenetic trees by T. J. Booth, S. Shaw, P. Cruz-Morales, T. Weber

    Published 2025-01-01
    “…Conclusions getphylo is a quick and reliable tool for the automated generation of genome-scale phylogenetic trees. getphylo can produce phylogenies comparable to other software in a fraction of the time, without the need large local databases or intense computation. getphylo can rapidly identify orthologues from a wide variety of datasets regardless of taxonomic or genomic scope. …”
    Get full text
    Article