-
341
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01“…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
Get full text
Article -
342
Novel Method of Analysis for the Determination of Residual Formaldehyde by High-Performance Liquid Chromatography
Published 2022-01-01“…For these reasons, the majority of papers found in the literature are based upon a derivatisation process (most commonly using the desensitised explosive 2,4-dinitrophenylhydrazine) prior to the analysis of formaldehyde. …”
Get full text
Article -
343
Multiple Extracranial Metastases from Primary Gliosarcoma in a Patient with Two Previous Different Primary Cancers
Published 2019-01-01“…We report a case of a 55-year-old male with a prior history of two distinct primary cancer types who, as a third independent type, developed GS with penetrating tumor growth to the skull and subcutaneous soft tissue via explosive spreading through a titanium net as well as extracranial metastases to the lumbar spine, paravertebral musculature, and most likely the right lung. …”
Get full text
Article -
344
Real-time predication and navigation on traffic congestion model with equilibrium Markov chain
Published 2018-04-01“…With the explosive growth of vehicles on the road, traffic congestion has become an inevitable problem when applying guidance algorithms to transportation networks in a busy and crowded city. …”
Get full text
Article -
345
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
346
Slot development using the controlled blasting in the ore body "Borska reka"
Published 2024-01-01“…Blasting the lower and upper parts of the slot created a free space of approximately 840 m³ with an approximate specific explosive consumption of 2.25 kg/m³…”
Get full text
Article -
347
Using Improved Ant Colony Algorithm to Investigate EMU Circulation Scheduling Problem
Published 2014-01-01“…However, due to the high acquisition and maintenance cost, it is impossible for decision-making departments to purchase enough EMUs to satisfy the explosive travel demand. Therefore, there is an urgent need to study how to utilize EMU more efficiently and reduce costs in the case of completing a given task in train diagram. …”
Get full text
Article -
348
ALVIC versus the Internet: Redesigning a Networked Virtual Environment Architecture
Published 2008-01-01“…The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. …”
Get full text
Article -
349
War Through an Interdisciplinary Lens. Book Review of ‘An Inquiry into the Applied Theory of War’ by Andrey A. Kokoshin
Published 2020-11-01“…The reviewer also commends the author’s observations on new trends in modern warfare, including an increase in number and geographical scope of local military conflicts, a worldwide growth in military expenditures, and an explosive progress in advanced military technologies. …”
Get full text
Article -
350
Forecasting Eruptions at Poorly Known Volcanoes Using Analogs and Multivariate Renewal Processes
Published 2022-06-01“…Applying this tool to Tongariro volcano (NZ), there is a 5% probability for a Volcanic Explosivity Index (VEI) ≥ 3 explosive eruption in the next 50 years. …”
Get full text
Article -
351
New multiple access and waveform technology for 6G
Published 2022-10-01“…With the explosive growth of Internet devices, the 5G new radio (NR) system faces congestion and high latency issues due to the low access efficiency of traditional orthogonal multiple access (OMA).Besides this, the performance of the orthogonal frequency-division multiplexing (OFDM)-based system is severely degraded due to the Doppler effect in high-speed scenarios.To meet the low-latency, high-reliability, and massive connection requirements of 6G communication in high-mobility scenarios, firstly, a novel orthogonal time frequency space (OTFS)-based pattern division multiple access (PDMA) scheme, shortened as OTFS-PDMA, was proposed.Then, the system input-output relationship of different types of PDMA codeword allocation schemes in the delay-Doppler (DD) domain was derived.Finally, a low-complexity expectation propagation algorithm (EPA)-based receiver was proposed.Simulation results illustrate that the proposed OTFS-PDMA scheme achieves significant performance gains over the conventional OTFS-OMA scheme.For regular PDMA patterns, the PDMA codeword allocation has a slight impact on the system performance.For irregular patterns, the centralized spreading method outperforms the discrete one.For discrete spreading scheme, the system can achieve better performance by assigning irregular PDMA spread signals along the Doppler direction.In addition, the proposed EPA receiver outperforms its conventional counterparts.…”
Get full text
Article -
352
A solution of computing power network based on domain name resolution
Published 2021-10-01“…With the development of new digital technologies and businesses, and the explosive growth of information and data, cloud - edge - end multilevel computing power resources are facing huge application requirements.Generalization of computing power infrastructure has become a major trend.As a new direction of network technology, computing power network integrates computing and other resources with the network, provides optimal resource configuration policies for users based on their requirements, and improves the cooperative efficiency of multilevel computing resources.The current technical route of the computing power network were analyzed, a solution of computing power network based on domain name resolution was proposed.The solution introduces a domain name resolution mechanism to use URL language to identify multiple computing power resources uniformly, and a centralized computing power resource management platform performs unified allocation and scheduling of computing power resources.After the user receives the assigned computing power resource identifier, the network information of corresponding computing resource were parsed through the domain name resolution system, and the network connection was established with the resource pool through the computing power gateway for the user to access.This solution meets the demand for flexible expansion of the computing power resource identification and has good practicability and universality.…”
Get full text
Article -
353
Physicochemical Characteristics of Chitosan–Alginate Scaffold Containing Atorvastatin
Published 2023-01-01“…The results revealed that drug loading was nearly complete, and the first hour revealed a 25% explosive release. The drug was gradually released over 10 hr at approximately 35%. …”
Get full text
Article -
354
Sujeição e agência em situações de violência contra as mulheres: trajetórias de superação e ressignificação
Published 2017-01-01“…The study focuses on specific characteristics and similarities in the analyzed trajectories and allows to conclude that: (i) despite the relative delay in understanding the context of violence in its early signs, (ii) assigning idiosyncratic traits to partners such as explosive behavior or jealousy and (iii) the reluctance and hesitation to seek help at moment of violence, this group of women managed to give a new meaning to their lives, indicating a desire to overcome what they went through, something already or very close to the outcome in the narratives of them all. …”
Get full text
Article -
355
Intermediate cities and automobile parks in Chile. Territorial sustainability in check?
Published 2022-01-01“…Through the compilation and systematization of databases provided by official agencies and the use of statistical analysis, the explosive but heterogeneous increase of the vehicle fleet in the communes of such cities is made visible. …”
Get full text
Article -
356
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01“…There has been an explosive increase in the population of the OSN (online social network) in recent years. …”
Get full text
Article -
357
Damage Analysis of Aluminium Foam Panel Subjected to Underwater Shock Loading
Published 2017-01-01“…Underwater shock loading experiment device is the equipment which simulates underwater explosive shock wave through experiment. Underwater shock loading experiment device was used to conduct high-speed underwater impact on aluminium foam panel and its damage modes were studied in this paper. 3D dynamic DIC test system was used to collect and analyze real-time deformation of target board. …”
Get full text
Article -
358
Effects of layer arrangement, pin size, polyurethane thickness, and polyurethane hardness on forming limits of Al/Cu bimetallic sheets through multi-point forming process
Published 2025-01-01“…This study experimentally evaluated the forming limit diagram (FLD) of Al/Cu bimetallic sheets fabricated using explosive welding in multi-point forming. The results showed that the forming limit was greater in multi-point forming than in the Nakazima test. …”
Get full text
Article -
359
The Experimental Studies on Behavior of Ultrahigh-Performance Concrete Confined by Hybrid Fiber-Reinforced Polymer Tubes
Published 2015-01-01“…The test results show that the local rupture of HFRP tubes did not lead to explosive failure of UHPC cylinder, and its ductility is better than that of UHPC confined by only one type of FRP tube; HFRP tube can effectively improve the compressive strength and ultimate strain of UHPC specimens; the stress-strain curves divide into three distinct regions: linear phase, transition phase, and linear strengthening phase. …”
Get full text
Article -
360
The Physiological Aspects of Exercise-Induced Adaptation in the Cardiovascular System
Published 2025-01-01“…In the past four decades, explosive progress in knowledge and application has been made in the field of exercise physiology. …”
Get full text
Article