Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
4001
Hyperresearch use in the compilation and analysis of qualitative data
Published 2001-08-01Get full text
Article -
4002
Systematic Initialization Approaches for Portfolio Optimization Problems
Published 2019-01-01Get full text
Article -
4003
-
4004
RADIATION DIAGNOSIS OF RARE FORMS OF RESPIRATORY ORGAN SARCOIDOSIS
Published 2018-08-01“…Objective: to evaluate the clinical and radiological features of rare forms of sarcoidosis of the respiratory organs (SRO).Material and methods. …”
Get full text
Article -
4005
Evaluating cutinase from Fusarium oxysporum as a biocatalyst for the degradation of nine synthetic polymer
Published 2025-01-01Get full text
Article -
4006
Intelligent transportation systems: A survey on modern hardware devices for the era of machine learning
Published 2022-09-01Get full text
Article -
4007
-
4008
Framework for tasks suggestion on web search based on unsupervised learning techniques
Published 2022-09-01Get full text
Article -
4009
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01“…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
Get full text
Article -
4010
Dynamic secret sharing for enhanced cloud security: Tackling eavesdropping and threshold attacks
Published 2025-06-01“…Through rigorous performance evaluation, we demonstrate that our method reduces communication overhead and improves resource efficiency compared to existing solutions. …”
Get full text
Article -
4011
-
4012
Trusted Web Service Discovery Based on a Swarm Intelligence Algorithm
Published 2025-04-01“…The number of services on the internet has experienced explosive growth, and the rapid and accurate discovery of required services among a vast array of similarly functioning services with differing degrees of quality has become a critical and challenging aspect of service computing. In this paper, we propose a trusted service discovery algorithm based on an ant colony system (TSDA-ACS). …”
Get full text
Article -
4013
Enhancing healthcare data privacy and interoperability with federated learning
Published 2025-05-01Get full text
Article -
4014
Enhancing the security of memory in cloud infrastructure through in‐phase change memory data randomisation
Published 2021-09-01Get full text
Article -
4015
-
4016
Achieving cloud resource optimization with trust-based access control: A novel ML strategy for enhanced performance
Published 2025-12-01“…Cloud computing continues to rise, increasing the demand for more intelligent, rapid, and secure resource management. …”
Get full text
Article -
4017
Cropland suitability assessment evolution and outlooks
Published 2025-08-01“…Scientifically and rationally evaluating land suitability has thus emerged as a pressing issue demanding immediate attention, providing critical foundations for sustainable utilization and conservation of arable resources. …”
Get full text
Article -
4018
Symmetry-based analysis after surgical treatment of zygomaticomaxillary complex fractures using intraoperative cone-beam computed tomography: a retrospective case-control study
Published 2025-02-01“…The study aims to quantify and evaluate intraoperative reduction control by cone-beam computed tomography. …”
Get full text
Article -
4019
Determining the optimal choice of attenuation filters and propagation distance for polychromatic phase-contrast micro-computed tomography of a multi-material electromotor using syn...
Published 2025-05-01“…Optimizing phase-contrast micro-computed tomography (µCT) for a given object is not trivial if the radiation is polychromatic and the object multi-material. …”
Get full text
Article -
4020
Role of Positron Emission Tomography-Computed Tomography Scan in Reaching Definite Diagnosis in Patients With Fever of Unknown Origin and Inflammation of Unknown Origin in Rheumato...
Published 2025-02-01“…This is mainly due to the detailed initial evaluations that are performed in internal medicine clinics. …”
Get full text
Article