-
321
-
322
SpaceCAM: A 16 nm FinFET Low-Power Soft-Error Tolerant TCAM Design for Space Communication Applications
Published 2025-01-01Get full text
Article -
323
Application of Heterogeneous Network Oriented to NoSQL Database in Optimal Postevaluation Indexes of Construction Projects
Published 2022-01-01“…The focus on the structured data storage model has reduced the responsiveness of traditional relational databases to data changes. …”
Get full text
Article -
324
Development of visual surveillance standardization
Published 2018-10-01“…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
Get full text
Article -
325
Application of metal matrix nanocomposites in engineering
Published 2024-12-01“…These composites find application in a diverse range of fields, including computer components, data storage systems, various membranes and filters, as well as advanced materials in the automotive and aerospace industries. …”
Get full text
Article -
326
Assessing The Impact of Records Managers Training on Performance of Municipalities: A case Study Of Kabale Munuciplity Kabale District.
Published 2024“…The study was carried out in Kabalc municipality and data was corrected from I5 respondents including administrative staff, registry staff, and clients. …”
Get full text
Thesis -
327
Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography
Published 2024-10-01“…By analyzing the radix-4 NTT/INTT (inverse NTT) algorithm process, an efficient FPGA architecture was designed, which parameterized runtime configurability and offered compile-time configurability to meet diverse requirements, a pipeline approach was used to construct the radix-4 NTT unified butterfly unit, key algorithmic modules such as modular division and modular reduction were deeply optimized, thereby enhancing computational efficiency and reconfigurability. Additionally, a configurable multi-RAM storage optimization design scheme and data storage allocation algorithm were proposed to avoid memory conflicts and improve data access efficiency. …”
Get full text
Article -
328
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022-09-01Get full text
Article -
329
Assessing the Influence of High Population Growth Rate on Food Security in Nyamweru Subcounty Rubanda District.
Published 2024“…Self-administered questionnaires and interviews were used in data collection and data was analyzed using Excel, a computer software to generate descriptive statistics such as frequencies and percentages, and data was presented in tables and text. …”
Get full text
Thesis -
330
Web-Based File Sharing System: A Case Study of Kabale University.
Published 2023“…This will re-shape service delivery and improve technology to enhance on line sharing of data.…”
Get full text
Thesis -
331
Relevance of Records Management in Delivery of Health Services in Health Centers: A Case Study Kabale Regional Referral Hospital.
Published 2024“…The filing systems used at the hospital are Alphabetic, Numerical, and Chronological filling systems. The storage types of equipment used are open shelves, computers, boxes, cupboards, file folders, and file cabinets. …”
Get full text
Thesis -
332
Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption
Published 2012-10-01“…An attack on the permutation-based multi-polynomial scheme exposed in the paper of Guo was proposed.The scheme couldn’t frustrate the large-scale node capture attack was proved.A pair-wise key establishment scheme was proposed by introducing homomorphic encryption thought,which was used to protect polynomials and made all keys be established in encrypted state.Therefore,the large-scale node capture attack was thwarted because adversaries couldn’t get any information about polynomials from the encrypted data used to establish keys.A method was presented to achieve fully homomorphic encryption indirectly,which used much less storage and computation resource than existing fully homomorphic encryption.The analysis and experiment show our pair-wise key establishment scheme has very good performance in terms of storage,computation as well as communication and is suitable to wireless sensor networks with limited capability.…”
Get full text
Article -
333
Hydrological Excitation of Polar Motion Derived from GRACE Gravity Field Solutions
Published 2011-01-01“…Now, from the observations of the GRACE mission, we can estimate the polar motion excitation due to the global hydrology. Data processing of GRACE data is carried out by several centers of analysis, we focus on the new solution computed by the Groupe de Recherche de Géodésie Spatiale. …”
Get full text
Article -
334
The Importance of Database Design and Normalization Process
Published 2014-05-01“…When undesigned data is sto-red in the database there probably occur some problems such as data repeating and waste of storage space. …”
Get full text
Article -
335
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01“…With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.…”
Get full text
Article -
336
Unified Mobile App for Streamlining Verbal Autopsy and Cause of Death Assignment in India: Design and Development Study
Published 2025-01-01“…The front-end interface was developed using XML, while SQLite and MySQL were employed to streamline complete data storage on the local and server databases, respectively. …”
Get full text
Article -
337
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01“…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
Get full text
Article -
338
Predicting Insemination Outcome in Holstein Dairy Cattle using Deep Learning
Published 2024-12-01Get full text
Article -
339
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Published 2023-01-01“…Blockchain technology is used to achieve decentralised and distributed storage and management of authentication data. Besides, the BA scheme uses the idea of trust domains and trust credentials to establish a master-slave connection between IoT devices. …”
Get full text
Article -
340
Application of blockchain in telecom operators
Published 2020-05-01“…Blockchain is another disruptive technological revolution after the IoT,cloud computing and big data.Blockchain technology and typical application cases were firstly introduced,and then the role of blockchain technology and blockchain in operators were analyzed.Secondly,combined with the characteristics of the blockchain,the application of blockchain in multiple operators were focused on,such as infrastructure,international roaming settlement,digital points issuance and trading,data storage,cross-border payment,identity verification,and credit reporting.Finally,the challenges faced by operators in the comprehensive application of blockchain were introduced.…”
Get full text
Article