نتایج جستجو برای: keyword technique

تعداد نتایج: 624113  

2009
Jin Li Qian Wang Cong Wang Ning Cao Kui Ren Wenjing Lou

As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords a...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

this study focuses on tracing the clearly defined elements of magic realism in toni morrison’s song of solomon as an illustrious african american example of the mode. magic realism is a fictional technique that combines fantasy with raw physical reality in a search for truth beyond that available from the surface of everyday life. toni morrison, as a distinguished african-american practitioner ...

Journal: :Community Literacy Journal 2015

Journal: :research in applied linguistics 2015
marjan alibeigynejad farzin fahimniya

this study used keyword method during encoding information in transferring information from short term memory to make the retrieval easier. for this purpose, 50 adult female elementary students were chosen to participate in this study. this study required two groups of learners (control and experimental groups). the experimental group enjoyed some special flashcards which each of them involved ...

2017
Ithape Pramod Harsh Mathur

With the increased rate of growth and adaptation of cloud computing, daily, more and more sensitive information is being centralized onto the cloud. For the protection of valuable proprietary information, the data must be encrypted before outsourcing. There is no tolerance for typos and format inconsistencies which are normal user behavior. This makes effective data storage and utilization a ve...

2012
Osama Khan Asim Karim

Social media, such as tweets on Twitter and Short Message Service (SMS) messages on cellular networks, are short-length textual documents (short texts or microblog posts) exchanged among users on the Web and/or their mobile devices. Automatic keyword extraction from short texts can be applied in online applications such as tag recommendation and contextual advertising. In this paper we present ...

2017

In data privacy, record linkage is a well known technique used to evaluate the disclosure risk of protected data. Mainly, the idea is the linkage between records of different databases, which make reference to the same individuals. In this paper we introduce a new parametrized variation of record linkage relying on the Mahalanobis distance, and a supervised learning method to determine the opti...

2011
Haizhou Fu Kemafor Anyanwu

Effective techniques for keyword search over RDF databases incorporate an explicit interpretation phase that maps keywords in a keyword query to structured query constructs. Because of the ambiguity of keyword queries, it is often not possible to generate a unique interpretation for a keyword query. Consequently, heuristics geared toward generating the top-K likeliest user-intended interpretati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید