|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Bingyu Zhang, Yingtang Wei, Ronghua Liu, Shunzhen Tian and Kai Wei
The calibration and validation of hydrological model simulation performance and model applicability evaluation in Gansu Province is the foundation of the application of the flash flood early warning and forecasting platform in Gansu Province. It is diffi...
ver más
|
|
|
|
|
|
|
Hai Nan, Yumeng Kong, Jie Zhan, Mingqiang Zhou and Ling Bai
Membrane computing is a branch of natural computing, which is a new computational model abstracted from the study of the function and structure of living biological cells. The study of numerical computation based on membrane computation has received incr...
ver más
|
|
|
|
|
|
|
Guiming Zhang and Jin Xu
Kernel density estimation (KDE) is a commonly used method for spatial point pattern analysis, but it is computationally demanding when analyzing large datasets. GPU-based parallel computing has been adopted to address such computational challenges. The e...
ver más
|
|
|
|
|
|
|
Renbo Pang, Fujiang Yu, Yu Zhang and Ye Yuan
I/O is often a performance bottleneck in global ocean circulation models with fine spatial resolution. In this paper, we present an asynchronous parallel I/O framework and demonstrate its efficacy in the Mass Conservation Ocean Model (MaCOM) as a case st...
ver más
|
|
|
|
|
|
|
Phasawee Saingyen, Sittiporn Channumsin, Suwat Sreesawet, Keerati Puttasuwan and Thanathip Limna
The growing number of space objects leads to increases in the potential risks of damage to satellites and generates space debris after colliding. Conjunction assessment analysis is the one of keys to evaluating the collision risk of satellites and satell...
ver más
|
|
|
|
|
|
|
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit...
ver más
|
|
|
|
|
|
|
Zhixiang Liu, Yuanji Chen, Wenjun Xiao, Wei Song and Yu Li
As an improved method of the lattice Boltzmann method (LBM), the regularized lattice Boltzmann method (RLBM) has been widely used to simulate fluid flow. For solving high Reynolds number problems, large eddy simulation (LES) and RLBM can be combined. The...
ver más
|
|
|
|
|
|
|
Austin Anderson, Petros Potikas and Katerina Potika
Community detection has been (and remains) a very important topic in several fields. From marketing and social networking to biological studies, community detection plays a key role in advancing research in many different fields. Research on this topic o...
ver más
|
|
|
|
|
|
|
Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh and Yunheung Paek
This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while ...
ver más
|
|
|
|