Suggested Topics within your search.
Suggested Topics within your search.
-
961
The methodology of translating the metonymic images of the Resurrection in the Holy Qur’an according to Larson’s theory, the translation of Makarim Al-Shirazi and Hussain Ansaryan...
Published 2022-03-01“…His semantic translation is a faithful translation into the source language and a reliable way to translate texts, especially religious texts. …”
Get full text
Article -
962
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
963
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
964
CHARTER OF THE STAVROPOL KRAI: PROBLEM ISSUES AND SEARCH FOR SOLUTION
Published 2021-09-01“…The interpretation of the source of the government of the Stavropol Krai, which is the people of the Stavropol Kraias part of the multinational people of the Russian Federation, has been proposed. …”
Get full text
Article -
965
Prevalence and determinants of restrictive lung disorder among quarry workers at the Umuoghara quarry site, Ebonyi State, Nigeria: a cross-sectional study
Published 2025-01-01“…Data was collected using a pre-tested semi-structured questionnaire among 300 quarry workers selected by simple random sampling method. Lung function test was performed using a spirometer- spirovit SPI schiller and data was analyzed with the use of IBM SPSS version 23.0. …”
Get full text
Article -
966
Systemic model of segregation and transformation of urban solid waste
Published 2025-07-01“…These values were adjusted to a probability distribution function and expressed in state, flow and auxiliary equations, to explain and predict their behavior. …”
Get full text
Article -
967
Lived Experience of Patients Living with Glaucoma: A Qualitative Study
Published 2025-05-01“…Findings showed that the patients with early diagnosis, proper education with counseling, proper treatment and regular follow up preserved their visual function. …”
Get full text
Article -
968
Toward Sustainable Agriculture: DPA-UNet for Semantic Segmentation of Landscapes Using Remote Sensing Imagery
Published 2025-01-01“…This work presents a new architecture called Deep Pro Agri-UNet (DPA-UNet) meant specifically for agricultural field segmentation with high-resolution images sourced from Google Earth Pro in order to solve these problems. …”
Get full text
Article -
969
Estrutura da cadeia reversa: "caminhos" e "descaminhos" da embalagem PET Structure of the reverse chain: "ways" of PET packing
Published 2006-12-01“…The authors analyze the nature and the function of the reverse logistics and its strategies for articulation of the recycling chain. …”
Get full text
Article -
970
Nicorandil in patients with acute myocardial infarction undergoing primary percutaneous coronary intervention: a systematic review and meta-analysis.
Published 2013-01-01“…PubMed, EMBASE and CENTRAL databases and other sources were searched without language and publication restriction. 14 trials involving 1680 patients were included into this meta-analysis. …”
Get full text
Article -
971
Macroscale-area patterning of three-dimensional DNA-programmable frameworks
Published 2025-04-01Get full text
Article -
972
Study on the mechanism of Buzhong Yiqi Decoction in the treatment of rectal prolapse: related analysis of single-cell transcriptome sequencing based on surgical excision specimens
Published 2023-02-01“…One patient in each group was selected as the sample source for analysis, and the related analysis of single-cell transcriptome sequencing was performed. …”
Get full text
Article -
973
Crystallographic fragment screening reveals ligand hotspots in TRIM21 PRY-SPRY domain
Published 2025-06-01Get full text
Article -
974
A Robust InSAR-DEM Block Adjustment Method Based on Affine and Polynomial Models for Geometric Distortion
Published 2025-04-01“…Additionally, we select additional Sentinel-1 and Copernicus DEM data to verify the reliability of multi-source DEM matching and adjustment. …”
Get full text
Article -
975
Biomimetic Design Concepts in African Textile Prints: Embracing Nature's Influence on Fashion and Textiles
Published 2024-12-01“…Eight seed articles were identified after which bibliography coupling was done to identify important articles worthy of inclusion based on the main terms in the topic. The co-citation functionality in Google Scholar was used to further identify and select recent articles that meet the inclusion criteria set out. …”
Get full text
Article -
976
The effect of exercise on the immune response in different environmental conditions
Published 2014-10-01“…It is illustrated that abnormal environments are the primary source of physiological stresses which can disarrange the function of immune system. …”
Get full text
Article -
977
The Intelligent Infectious Disease Active Surveillance and early warning system in China: An application of dengue prevention and control
Published 2024-01-01“…Firstly, the system can proactively capture and integrate heterogeneous surveillance data from multiple sources. Based on these multi-channel data, users can select appropriate warning indicators and AI models to automatically trigger early warnings. …”
Get full text
Article -
978
YOLOX-LS: Strong Gravitational Lenses Detection in the DECaLS with Deep Learning
Published 2025-01-01“…We apply the YOLOX algorithm as the basic framework and improve it by selecting the optimal optimizer, activation function, attention mechanism, and loss function. …”
Get full text
Article -
979
Presenting a model of political behavior based on the theory of shadow management in the public sector with a hybrid method
Published 2025-03-01“…The statistical population of the research includes scientific articles, academic theses, and books selected by examining 167 sources, and finally 51 sources identified using a purposeful method of meta-synthesis were approved for analysis. …”
Get full text
Article -
980
Canopy Transpiration Mapping in an Apple Orchard Using High-Resolution Airborne Spectral and Thermal Imagery with Weather Data
Published 2025-05-01“…In addition, weather information for estimating ET is very often selected from sources that do not represent conditions like heterogeneous site-specific conditions. …”
Get full text
Article