نتایج جستجو برای: academy
تعداد نتایج: 26011 فیلتر نتایج به سال:
Cloud computing has emerged as the most dominant computational paradigm in recent times. There are tremendous benefits for enterprises adopting cloud technologies. It provides resources and services on demand, pay-as-you go basis. This includes infrastructure, platform and software services. But there are still a number of security threats and challenges associated with utilizing cloud computin...
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output of each S-box of the DES is precoded separately into a properly constructed copy of the inherent even-weight code of length 4. The study is focuse...
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image. But in case of less than k, users cannot reveal any partial information about the original image. We have proposed a significant secret image sharing technique based on XO...
This paper presents a group multi-criteria DEMATEL and VIKOR decision analysis method with interval type-2 fuzzy sets. In order to compare normal fuzzy trapezoidal numbers, we convert them into crisp values using graded mean integration representation. By a case study for selection of business intelligence platform, we prove that the proposed combination is a feasible solution that can work wit...
The previous results of J/ψ radiative decays from MARKIII, DM2, Crystal Ball and BESI are briefly reviewed in this talk. The main part of this talk focuses on presenting the recent results from BESII 5.8 × 10 J/ψ data, including the Partial Wave Analysis (PWA) results, the measurement of ηc mass, as well as search for some interesting states.
Data mining on vertically or horizontally partitioned dataset has the overhead of protecting the private data. Perturbation is a technique that protects the revealing of data. This paper proposes a perturbation and anonymization technique that is performed on the vertically partitioned data. A third-party coordinator is used to partition the data recursively in various parties. The parties pert...
Big Data became a buzz word nowadays due to the evolution of huge volumes of data beyond peta bytes. This article focuses on matrix multiplication with big sparse data. The proposed FASTsparseMUL algorithm outperforms the state-of-the-art big matrix multiplication approaches in sparse data scenario.
OnFebruary 27, 2011, Hollywood’s royalty will gather in Kodak Theater to honor the best films of 2010. To add a scientific twist on this year’s Academy Awards, Cell Culture dives beneath the skin of the top films’ protagonists, identifying a brain structure that impacts our ‘‘friend count,’’ genes that make a king stammer, a cellular fragmentation process that saves a solo hiker, and stem cells...
28 Computer Software Engineering in the Academy T here is no universally accepted definition of software engineering. For some, software engineering is just a glorified name for programming. If you are a programmer, you might put “software engineer” on your business card—never “programmer,” though. Others have higher expectations. A textbook definition of the term might read something like this...
The most important property of humankind is the capacity to form and maintain relationships. These relationships are absolutely necessary for any of us to survive, learn, work, love and procreate. Human relationships take many forms but the most intense, most pleasurable and most painful are those relationships with family, friends and loved ones. Within this inner circle of intimate relationsh...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید