نتایج جستجو برای: keyword technique
تعداد نتایج: 624113 فیلتر نتایج به سال:
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords a...
this study focuses on tracing the clearly defined elements of magic realism in toni morrison’s song of solomon as an illustrious african american example of the mode. magic realism is a fictional technique that combines fantasy with raw physical reality in a search for truth beyond that available from the surface of everyday life. toni morrison, as a distinguished african-american practitioner ...
this study used keyword method during encoding information in transferring information from short term memory to make the retrieval easier. for this purpose, 50 adult female elementary students were chosen to participate in this study. this study required two groups of learners (control and experimental groups). the experimental group enjoyed some special flashcards which each of them involved ...
With the increased rate of growth and adaptation of cloud computing, daily, more and more sensitive information is being centralized onto the cloud. For the protection of valuable proprietary information, the data must be encrypted before outsourcing. There is no tolerance for typos and format inconsistencies which are normal user behavior. This makes effective data storage and utilization a ve...
Social media, such as tweets on Twitter and Short Message Service (SMS) messages on cellular networks, are short-length textual documents (short texts or microblog posts) exchanged among users on the Web and/or their mobile devices. Automatic keyword extraction from short texts can be applied in online applications such as tag recommendation and contextual advertising. In this paper we present ...
In data privacy, record linkage is a well known technique used to evaluate the disclosure risk of protected data. Mainly, the idea is the linkage between records of different databases, which make reference to the same individuals. In this paper we introduce a new parametrized variation of record linkage relying on the Mahalanobis distance, and a supervised learning method to determine the opti...
Effective techniques for keyword search over RDF databases incorporate an explicit interpretation phase that maps keywords in a keyword query to structured query constructs. Because of the ambiguity of keyword queries, it is often not possible to generate a unique interpretation for a keyword query. Consequently, heuristics geared toward generating the top-K likeliest user-intended interpretati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید