Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
27081
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
27082
Structural Optimisation of a Suspension Control Arm Using a Bi-Evolutionary Bone Remodelling Inspired Algorithm and the Radial Point Interpolation Method
Published 2025-01-01“…Today, topological structural optimisation is a valuable computational technique for designing mechanical components with optimal mass-to-stiffness ratios. …”
Get full text
Article -
27083
STAR‐ESDM: A Generalizable Approach to Generating High‐Resolution Climate Projections Through Signal Decomposition
Published 2024-07-01“…The Seasonal Trends and Analysis of Residuals empirical statistical downscaling model (STAR‐ESDM) is a computationally‐efficient, flexible approach to generating such projections that can be applied globally using predictands and predictors sourced from weather stations, gridded data sets, satellites, reanalysis, and global or regional climate models. …”
Get full text
Article -
27084
Extensive Prostatic Abscess in an Elderly Patient Requiring Multidisciplinary Drainage
Published 2020-01-01“…He had a positive urinalysis and culture and was initially thought to have a urinary tract infection; however, computed tomography scan revealed a large, complex, and multiloculated prostatic abscess. …”
Get full text
Article -
27085
An analysis on role of iron deficiency in febrile seizure among children in 6 months to 5 years: A case-control study
Published 2024-12-01“…Descriptive statistics were computed using “Chi-square tests for proportions” and “t-tests for means” with P ≤ 0.05 as the level of significance. …”
Get full text
Article -
27086
Path Planning Optimization of Smart Vehicle With Fast Converging Distance-Dependent PSO Algorithm
Published 2024-01-01“…In DSI-PSO, each particle computes a distance metric and leverages a sigmoid function to adaptively update its inertia weight. …”
Get full text
Article -
27087
THE COURSE OF ACUTE RESPIRATORY COVID-19 DISEASE, COMPLICATED BY COMMUNITY-ACQUIRED PNEUMONIA AGAINST THE BACKGROUND OF THE CARDIOVASCULAR SYSTEM PATHOLOGY
Published 2021-08-01“…We conducted general clinical methods of research, determined the SARS-CoV-2 virus RNA by PCR and chest X-ray in 2 projections or computed tomography (CT) to identify the features of the lung tissue damage. …”
Get full text
Article -
27088
A Study on Life Skills among Adolescents Attending Government Schools
Published 2024-01-01“…To see the variation in life skills across the sociodemographic factors, independent sample t-tests (religion, residence, types of family, and socioeconomic status) and ANOVA (age levels, birth order, mother’s education, and father’s education) were used. Effect sizes were computed as partial eta-squared. The level of significance was kept at 0.05, and post hoc Bonferroni corrections were made for multiple comparisons. …”
Get full text
Article -
27089
Polycarbonate Microchip Containing CuBTC-Monopol Monolith for Solid-Phase Extraction of Dyes
Published 2020-01-01“…The assessment of reproducibility for chip-to-chip was undertaken by computing the relative standard deviations (RSDs) of the six dyes in extraction. …”
Get full text
Article -
27090
The Effect of Exosomes Derived from Human Umbilical Cord Mesenchymal Stromal/Stem Cells on the Regeneration of Human Pulpectomized Tooth: A Case Report
Published 2025-01-01“…Clinical evaluations, including visual inspection, palpation, pulp vitality tests, radiography, and cone beam computed tomography (CBCT) imaging, were conducted over 24 weeks post-treatment. …”
Get full text
Article -
27091
Impact of tumor position displacement during end-exhalation breath-hold condition on tumor dose in lung stereotactic body radiation therapy using volumetric modulated arc therapy
Published 2025-03-01“…This study used four-dimensional (4D) dose calculation with cine computed tomography (CT) to evaluate the impact of unexpected tumor position displacement during breath-holding on the target dose of lung volumetric modulated arc therapy (VMAT)-SBRT. …”
Get full text
Article -
27092
Characteristics of Karst Cave Development in Urban Karst Area and Its Effect on the Stability of Subway Tunnel Construction
Published 2021-01-01“…The crosshole seismic Computed Tomography (CT) integrated with Geological Drilling (Geo-D) was first applied to accurately delineate the karst location and its scale. …”
Get full text
Article -
27093
Development and Validation of 3D Finite Element Models for Prediction of Orthodontic Tooth Movement
Published 2018-01-01“…Two orthodontic patients were enrolled in this study. Computed tomography (CT) was captured 2 times. The first time was at T0 immediately before canine retraction. …”
Get full text
Article -
27094
“Etiology and CT pattern in patients with interstial lung disease”: shift in the trends?
Published 2023-12-01“…The commonest high-resolution computed tomography (HRCT) thorax pattern was usual interstitial pneumonia (UIP) (n = 52, 50%). …”
Get full text
Article -
27095
Ocular Hypertropia Mimicking Inferior Rectus Palsy as an Atypical Presentation of Parameningeal Rhabdomyosarcoma in a Child
Published 2025-01-01“…He had a history of blunt trauma to the face before 5 days. Computed tomography (CT) of the head revealed a soft tissue density involving the left maxillary sinus. …”
Get full text
Article -
27096
Exploration of the feasibility of clinical application of phage treatment for multidrug-resistant Serratia marcescens-induced pulmonary infection
Published 2025-12-01“…Treatment with phage Spe5P4 showed good efficacy, manifested as amelioration of symptoms, hydrothorax examinations, and chest computed tomography findings. Phage treatment did not worsen hepatic and renal function, immunity-related indices, or indices of routine blood examination. …”
Get full text
Article -
27097
Alcohol Intoxication and Glasgow Coma Scale Scores in Patients with Head Trauma
Published 2020-12-01“…The patients underwent head computed tomography and had a BAC ≥80 mg/dL. Patients were divided into TBI and non-TBI groups. …”
Get full text
Article -
27098
Optimal strategies of social distancing and vaccination against seasonal influenza
Published 2013-07-01“…In combination with the Pontryagins maximum principle, we calculated time-dependent optimal policies of vaccination and social distancing to minimize the epidemiological and economic burden associated with seasonal influenza. We computed optimal age-specific intervention strategies and analyze them under various costs of interventions and disease transmissibility. …”
Get full text
Article -
27099
Experimental dataset of a model-scale ship in calm water and wavesUniversity of Southampton Institutional Repository
Published 2025-02-01“…The acquisition of high-quality experimental data is essential for refining Computational Fluid Dynamics (CFD) simulations and modifying analytical methods to evaluate the powering performance of ships. …”
Get full text
Article -
27100
Soil-Rock Slope Stability Analysis under Top Loading considering the Nonuniformity of Rocks
Published 2020-01-01“…To obtain better estimation results, a new rock contour establishing algorithm was developed, capable of considering interlock effect between rocks. Then, computed tomography (CT) and unconfined triaxial tests with ring top loadings were conducted. …”
Get full text
Article