-
81
Utilization of Machine-Learning-Based model Hybridized with Meta-Heuristic Frameworks for estimation of Unconfined Compressive Strength
Published 2025-01-01Subjects: Get full text
Article -
82
Fast and low‐power leading‐one detectors for energy‐efficient logarithmic computing
Published 2021-07-01Subjects: Get full text
Article -
83
Modeling Compressive Strength of Self-Compacting Concrete (SCC) Using Novel Optimization Algorithm of AOA
Published 2024-09-01Subjects: “…arithmetic optimization algorithm…”
Get full text
Article -
84
Comprehensive survey of ternary full adders: Statistics, corrections, and assessments
Published 2023-05-01Subjects: Get full text
Article -
85
Utilizing the Novel Developed MLP Techniques to Survey Pile Subsidence via Optimization Algorithms
Published 2022-10-01Subjects: “…arithmetic optimization algorithm…”
Get full text
Article -
86
-
87
-
88
Application of 16 bit image lossy compression based on the JPEG standard
Published 2016-04-01Subjects: Get full text
Article -
89
Generalized Heptagonal Membership Function for Fully Fuzzy Linear Fractional Programming Problems
Published 2025-01-01Subjects: Get full text
Article -
90
Profile of the grain physical traits and physicochemical properties of selected Malaysian rice landraces for future use in a breeding program
Published 2024-09-01Subjects: “…unweighted pair group method with arithmetic mean (upgma)…”
Get full text
Article -
91
A new class of infinite products, and Euler's totient
Published 1994-01-01Subjects: Get full text
Article -
92
The functional voxel algorithm for iterative composition of complex contours
Published 2023-06-01Subjects: Get full text
Article -
93
-
94
Calculation of drug dosages : a work text /
Published 2012Subjects: “…Pharmaceutical arithmetic Programmed instruction. 4734…”
View in OPAC
Book -
95
On the degree of approximation by Gauss Weierstrass integrals
Published 2000-01-01Subjects: Get full text
Article -
96
Calculate with Confidence /
Published 2014Subjects: “…Pharmaceutical arithmetic. 4734…”
View in OPAC
Book -
97
Mental Toughness Levels of Male and Female Football Players
Published 2023-04-01Subjects: Get full text
Article -
98
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
99
Fuzzy Triangular Aggregation Operators
Published 2018-01-01“…We also use the concept of triangular norms (t-norms and t-conorms) as pseudo-arithmetic operations. As a result, we get notably the fuzzy triangular weighted arithmetic (FTWA), the fuzzy triangular ordered weighted arithmetic (FTOWA), the fuzzy generalized triangular weighted arithmetic (FGTWA), the fuzzy generalized triangular ordered weighted arithmetic (FGTOWA), the fuzzy triangular weighted quasi-arithmetic (Quasi-FTWA), and the fuzzy triangular ordered weighted quasi-arithmetic (Quasi-FTOWA) operators. …”
Get full text
Article -
100
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
Get full text
Article