Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54581
Quasi-3D model to simulate flow in straight channels within vegetation patches
Published 2025-01-01“…In this paper, we conducted a comparative analysis between the Bottom Velocity Computation (BVC) method for quasi-three-dimensional models, which is the enhanced depth-integrated model with sub-grid three-dimensional model, conventional two-dimensional model, and three-dimensional model to explore the three-dimensional (3D) flow effects induced by the presence of vegetation patches. …”
Get full text
Article -
54582
A Unique Trinucleotide-Bloc Mutation-Based Two SARS-CoV-2 Genotypes with Potential Pathogenic Impacts
Published 2022-01-01“…By analyzing more than 3000 high-coverage, complete sequences deposited in the GISAID database up to April 2020, here I report the uniqueness of the 28881–28883: GGG > AAC trinucleotide-bloc mutation in the SARS-CoV-2 genome that results in two substrains, described here as SARS-CoV-2g (28881–28883: GGG genotype) and SARS-CoV-2a (28881–28883: AAC genotype). Computational analysis and literature review suggest that this bloc mutation would bring 203–204: RG (arginine-glycine)>KR (lysine-arginine) amino acid changes in the nucleocapsid (N) protein affecting the SR (serine-arginine)-rich motif of the protein, a critical region for the transcription of viral RNA and replication of the virus. …”
Get full text
Article -
54583
How to Improve the Science and Engineering Education in Islamic Countries?
Published 2018-12-01“…It is emphasized that the higher education and scientific research should have philosophy, logic, geometry and natural event visualizations prior to mathematical and computational calculations in engineering education.…”
Get full text
Article -
54584
Modern trends of digitalization of innovation process
Published 2018-03-01“…Modern information technologies are characterized by high computing power, they take control of the organization, production, creation of innovations to a fundamentally different quality level.Currently, the success of competition is determined by the ability of organizations to quickly implement and commercialize innovations and obtain superprofits, in this regard it seems relevant to explore the possibilities of digital solutions and technologies for the effective management and management of innovation.The article analyzes the current state of the information technology industry and the information and communication technologies industry, on the basis of which the problems of the industry development have been identified, and proposals have been developed to use digital products to stimulate the innovation process.…”
Get full text
Article -
54585
The reaction of the social security systems of the European Union and the united states of America to financial crises: proposals for using the experience in Russia
Published 2024-11-01“…When conducting the study, the following methods have been used: analysis, induction, measurement, comparison, computational and constructive, statistical and economic. …”
Get full text
Article -
54586
Design of a Wireless Sensor Network Monitoring System for Biological and Pharmaceutical Products
Published 2015-04-01Get full text
Article -
54587
Zincophilic CuO as electron sponge to facilitate dendrite-free zinc-based flow battery
Published 2025-01-01Get full text
Article -
54588
-
54589
Generation of perthiyl radicals for the synthesis of unsymmetric disulfides
Published 2025-01-01Get full text
Article -
54590
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article -
54591
Energy Adaptive Collaborative Charging Scheduling for Wireless Rechargeable Sensor Networks
Published 2024-01-01Get full text
Article -
54592
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
54593
-
54594
Next decade of telecommunications artificial intelligence
Published 2021-03-01“…It has been an exciting journey since the mobile communications and AI were conceived 37 years and 64 years ago.While both fields evolved independently and profoundly changed communications and computing industries, the rapid convergence of 5G and AI is beginning to significantly transform the core communication infrastructure, network management and vertical applications.The individual roadmaps of mobile communications and artificial intelligence in the early stage were firstly outlined, with a concentration to review the era from 3G to 5G when AI and mobile communications started to converge.With regard to telecommunications artificial intelligence, the progress of AI in the ecosystem of mobile communications was further introduced in detail, including network infrastructure, network operation and management, business operation and management, intelligent applications towards BSS & OSS convergence, verticals and private networks etc.Then the classifications of AI in telecom ecosystems were summarized along with its evolution paths specified by various international telecommunications standardization bodies.Towards the next decade, the prospective roadmap of telecommunications artificial intelligence was forecasted.In line with 3GPP and ITU-R’s timeline of 5G & 6G, the network intelligence following 3GPP and O-RAN routes, experience and intention driven network management and operation, network AI signaling system, intelligent middle-office based BSS, intelligent customer experience management and policy control driven by BSS& OSS convergence, evolution from SLA to ELA, and intelligent private network for verticals were further explored.It concludes that with the vision AI will reshape the future B5G/6G landscape, and we need fully take the unprecedented opportunities.…”
Get full text
Article -
54595
Large-scale S-box design and analysis of SPS structure
Published 2023-02-01“…A class of optimal linear transformation P over a finite field<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msup> <mrow> <mrow><mo>(</mo> <mrow> <msubsup> <mi>F</mi> <mn>2</mn> <mi>m</mi> </msubsup> </mrow> <mo>)</mo></mrow></mrow> <mn>4</mn> </msup> </mrow></math></inline-formula> was constructed based on cyclic shift and XOR operation.Using the idea of inverse proof of input-output relation of linear transformation for reference, a proof method was put forward that transformed the objective problem of optimal linear transformation into several theorems of progressive relation, which not only solved the proof of that kind of optimal linear transformation, but also was suitable for the proof of any linear transformation.By means of small-scale S-box and optimal cyclic shift-XOR linear transformation P, a large-scale S-box model with 2-round SPS structure was established, and a series of lightweight large-scale S-boxes with good cryptographic properties were designed.Only three kind of basic operations such as look-up table, cyclic shift and XOR were used in the proposed design scheme, which improved the linearity and difference uniformity of large-scale S-boxes.Theoretical proof and case analysis show that, compared with the existing large-scale S-box construction methods, the proposed large-scale S-box design scheme has lower computational cost and better cryptographic properties such as difference and linearity, which is suitable for the design of nonlinear permutation coding of lightweight cryptographic algorithms.…”
Get full text
Article -
54596
Numerical Simulation of Turbulent Fluid Flow and Heat Transfer in a Ribbed Rotating Two-Pass Square Duct
Published 2005-01-01“…<p>The local turbulent fluid flow and heat transfer in a rotating two-pass square duct with 19 pairs of in-line <math alttext="$90^{circ}$"><msup><mn>90</mn> <mo>∘</mo> </msup> </math> ribs have been investigated computationally. A Reynolds-averaged Navier-Stokes equation (RANS) with a two-layer <math alttext="${k}-varepsilon$"><mi>k</mi> <mo>−</mo> <mi>ϵ</mi> </math> turbulence model was solved. …”
Get full text
Article -
54597
A two-patch prey-predator model with predator dispersal driven by the predation strength
Published 2017-07-01Get full text
Article -
54598
Numerical Calculation of Fracture Seepage in Rough Rock and Analysis of Local Pressure Drop
Published 2021-01-01“…The Navier-Stokes (NS) equation can be solved directly for the seepage flow in rock fractures with good accuracy, but there are problems of large computational volume and slow solution speed. In this paper, the fracture aperture space data is substituted into the local cubic law as an aperture function to form a numerical calculation method for seepage in rough rock fractures, namely, the aperture function method (AFM). …”
Get full text
Article -
54599
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. …”
Get full text
Article -
54600
getphylo: rapid and automatic generation of multi-locus phylogenetic trees
Published 2025-01-01“…Conclusions getphylo is a quick and reliable tool for the automated generation of genome-scale phylogenetic trees. getphylo can produce phylogenies comparable to other software in a fraction of the time, without the need large local databases or intense computation. getphylo can rapidly identify orthologues from a wide variety of datasets regardless of taxonomic or genomic scope. …”
Get full text
Article