Showing 221 - 240 results of 411 for search 'Computer data storage', query time: 0.07s Refine Results
  1. 221
  2. 222

    Simulations of large-scale zero boiloff, densification, and solidification of hydrogen by Colin P. Mahony, Jeffrey G. Marchetta, Adam M. Swanger

    Published 2025-03-01
    “…The simulations were performed using a commercially available Computational Fluid Dynamics (CFD) pressure-based mass and momentum flow model and an enthalpy-porosity energy model. …”
    Get full text
    Article
  3. 223

    Multilayer magnetic skyrmion devices for spiking neural networks by Aijaz H Lone, Daniel N Rahimi, Hossein Fariborzi, Gianluca Setti

    Published 2025-01-01
    “…Spintronic devices -based on magnetic solitons, such as the domain wall motion and the skyrmions, have shown a significant potential for applications in energy-efficient data storage and beyond CMOS computing architectures. …”
    Get full text
    Article
  4. 224
  5. 225
  6. 226
  7. 227

    Secure and verifiable multi-keyword searchable encryption scheme in cloud by Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG

    Published 2021-04-01
    “…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
    Get full text
    Article
  8. 228
  9. 229

    Innovations at Ukrainian enterprises: use of information and communication technologies by S. Babych, D. Babych

    Published 2024-06-01
    “…Only about 10% of all enterprises in Ukraine use cloud computing services. The article presents a subjective assessment, namely, the results of a survey of Ukraini-an companies based on 2023 data regarding using the new technologies, including: ChatGPT and Artificial Intelligence, cloud services and data storage, online services and platforms for remote work organization, QES for personal identification, CRM sys-tems for working with clients, creation of mobile applications and chatbots in messen-gers. …”
    Get full text
    Article
  10. 230
  11. 231
  12. 232
  13. 233

    Towards accurate anomaly detection for cloud system via graph-enhanced contrastive learning by Zhen Zhang, Zhe Zhu, Chen Xu, Jinyu Zhang, Shaohua Xu

    Published 2024-11-01
    “…Moreover, complicated topological associations existed between cloud servers (e.g., computation, storage, and communication). While acquiring resource information, correlating the system topology is challenging. …”
    Get full text
    Article
  14. 234

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party collaborative computing and federated learning. …”
    Get full text
    Article
  15. 235

    Cloud-Integrated Meteorological Parameter Prediction by Leveraging Multivariate Statistical Time Series and GANs by Archana Rout, Biswa Ranjan Senapati, Debahuti Mishra

    Published 2025-01-01
    “…Using cloud-based services ensures scalability and computational efficiency for data storage, processing, and model deployment in weather parameters. …”
    Get full text
    Article
  16. 236

    Research on the lightweight detection method of rail internal damage based on improved YOLOv8 by Xiaochun Wu, Shuzhan Yu

    Published 2025-01-01
    “…Abstract To address the challenges of high computational costs, large storage demands, and low detection accuracy in internal rail damage identification, we propose a lightweight detection model, GhostMicroNet-YOLOv8n, as an enhancement of YOLOv8n. …”
    Get full text
    Article
  17. 237
  18. 238

    Research on Spaceborne Neural Network Accelerator and Its Fault Tolerance Design by Yingzhao Shao, Junyi Wang, Xiaodong Han, Yunsong Li, Yaolin Li, Zhanpeng Tao

    Published 2024-12-01
    “…This fault-tolerant architecture analyzes the hardware accelerator, parameter storage, and actual computation, employing data validation to reinforce model parameters and spatial and temporal TMR to reinforce accelerator computations. …”
    Get full text
    Article
  19. 239

    Ferroelectric capacitive memories: devices, arrays, and applications by Zuopu Zhou, Leming Jiao, Zijie Zheng, Yue Chen, Kaizhen Han, Yuye Kang, Dong Zhang, Xiaolin Wang, Qiwen Kong, Chen Sun, Jiawei Xie, Xiao Gong

    Published 2025-01-01
    “…Abstract Ferroelectric capacitive memories (FCMs) utilize ferroelectric polarization to modulate device capacitance for data storage, providing a new technological pathway to achieve two-terminal non-destructive-read ferroelectric memory. …”
    Get full text
    Article
  20. 240

    Gene Selection Based Cancer Classification With Adaptive Optimization Using Deep Learning Architecture by Anju Das, N. Neelima, K. Deepa, Tolga Ozer

    Published 2024-01-01
    “…In the existing works, certain limitations, such as reduced performance due to degraded data quality, high storage space requirements, overfitting issues, and lack of robustness, can compromise overall classification accuracy. …”
    Get full text
    Article