-
941
ALIGNING PRAXIS OF FAITH AND THEOLOGICAL THEORY IN THEOLOGICAL EDUCATION THROUGH AN EVALUATION OF CHRISTIANITY IN SOUTH AFRICA
Published 2021-06-01“…Christianity is also in need of a revolution back to its origin of an un-institutionalised, non-hierarchical, living faith that is changing the lives of people both in the present and eternally. …”
Get full text
Article -
942
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
943
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Published 2020-01-01“…Unlike the traditional scrambling way, a hierarchical diffusion strategy, which not only changes the pixel position but also modifies the value, is employed in the permutation phase. …”
Get full text
Article -
944
Study on Thermally Induced Crack Propagation Behavior of Functionally Graded Materials Using a Modified Peridynamic Model
Published 2020-01-01“…It can be found that the thermal cracks in FGMs are still in periodical and hierarchical forms. The metal materials in FGMs can prevent crack initiation and arrest the long cracks. …”
Get full text
Article -
945
Buridan’s Sophisms, Alethic Predicates and Anaphoric Prosententialism
Published 2022-09-01“…Unlike Russell-Tarski hierarchical approach, it pays tribute to the intuitive claim of the semantic universality of natural languages (their ability to express own semantics).…”
Get full text
Article -
946
Psychophysiological Markers of Executive Functions during Copying Sentences
Published 2024-12-01“… <p>Typing is a multi-level process involving executive and motor functions. Due to its hierarchical organization, it becomes possible to study the psychophysiological features of higher mental functions in the natural environment by analyzing automated motor activity. …”
Get full text
Article -
947
Beyond clay: tracing Mekelle’s pottery tradition through ethnoarchaeological and sociocultural lenses
Published 2024-12-01“…In this paper, social dynamics within Mekelle’s pottery making community, including hierarchical rankings and gender-based division of labor, are explored, showing that women exclusively handle the making, transportation, and marketing of pottery, while men engage in smithing and weaving. …”
Get full text
Article -
948
Pose Estimation of Uncooperative Unknown Space Objects from a Single Image
Published 2020-01-01“…Our method estimates not only the pose but also the shape of the unknown object from a single image. In this paper, a hierarchical shape model is proposed to represent the prior structure information of typical space objects. …”
Get full text
Article -
949
A Scalable Blockchain Framework for ELA Assessment
Published 2022-01-01“…We propose a proficiency evaluation model based on a Discrete Hopfield Neural Network (DHNN). Firstly, the hierarchical analysis method is used to construct the evaluation index system of students’ English ability, and then the ability classification indexes are divided into 5 levels.The network achieves the classification of students’ English proficiency through the associative memory of the classification criteria, and the classification results are compared with those of the BPNN model. …”
Get full text
Article -
950
Tricalcium phosphate-based capillary suspensions as inks for 3D printing of porous scaffolds
Published 2025-03-01“…Direct Ink Writing (DIW) has been extensively studied for creating hierarchical porous structures over recent decades. It finds applications in various fields, including aeronautics, industry, energy, and healthcare. …”
Get full text
Article -
951
Non-Markovian quantum exceptional points
Published 2025-02-01“…This work addresses this gap by proposing a general framework based on two numerically exact descriptions of non-Markovian dynamics: the pseudomode equation of motion (PMEOM) and the hierarchical equations of motion (HEOM). The PMEOM is particularly useful due to its Lindblad-type structure, aligning with previous studies in the Markovian regime while offering deeper insights into EP identification. …”
Get full text
Article -
952
Copyright protection algorithm based on differential privacy deep fake fingerprint detection model
Published 2022-09-01“…A copyright protection algorithm based on differential privacy for deep fake fingerprint detection model (DFFDM) was proposed, realizing active copyright protection and passive copyright verification of DFFDM without weakening the performance of the original task.In the original task training, noise was added to introduce randomness, and the expected stability of the differential privacy algorithm was used to make classification decisions to reduce the sensitivity to noise.In passive verification, FGSM was used to generate adversarial samples, the decision boundary was fine-adjusted to establish a backdoor, and the mapping was used as an implanted watermark to realize passive verification.To solve the copyright confusion caused by multiple backdoors, a watermark verification framework was designed, which stamped the trigger backdoors and identified the copyright with the help of time order.In active protection, to provide users with hierarchical services, the key neurons in the task were frozen by probabilistic selection strategy, and the access rights were designed to realize the thawing of neurons, so as to obtain the right to use the original task.Experimental results show that the backdoor verification is still effective under different model performance, and the embedded backdoor shows a certain robustness to the model modification.Also, the proposed algorithm can resist not only the collusion attack by the attacker to recruit legitimate users, but also the fine-tuning and compression attacks caused by the model modification.…”
Get full text
Article -
953
Les contestations sociales du développement touristique dans les Hautes-Pyrénées : le rendez-vous manqué de l’innovation territoriale ?
Published 2016-04-01“…Unlike the protest movements of the 1970s, these citizens’ associations remain pragmatic, non-hierarchical and local, led by ‘mountain folk’. Some local campaigns are ambiguous in nature and bring together a highly diverse array of stakeholders with interests in the local economy. …”
Get full text
Article -
954
The Impact of Resource Optimization on the Economic Development of the Marine Industry
Published 2022-01-01“…Therefore, a new method is designed to solve the above problems; by analyzing the scale, hierarchical system, and optimizing the spatial resource framework of the marine industry, the influence of different marine industries is comprehensively measured, and the final demand dependency of the marine industry economy is obtained. …”
Get full text
Article -
955
Comparison of the Chemical Properties of Forest Soil from the Silesian Beskid, Poland
Published 2014-01-01“…Implementation of hierarchical clustering to experimental data analysis allowed drawing a conclusion that the two forest areas vary significantly in terms of content of aluminium extracted with solutions of barium chloride (Alexch), sodium diphosphate (Alpyr), and pHKCl and in the amount of humus in soil.…”
Get full text
Article -
956
A Moving Object Detection Method Using Deep Learning-Based Wireless Sensor Networks
Published 2021-01-01“…This method uses the deep learning model to extract visual potential representation features through offline similarity function ranking learning and online model incremental update and uses the hierarchical clustering algorithm to achieve target detection and positioning; the low-precision histogram and high-precision histogram cascade the method which determines the correct position of the target and achieves the purpose of detecting the moving target. …”
Get full text
Article -
957
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure
Published 2014-01-01“…Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. …”
Get full text
Article -
958
Improving source code suggestion with code embedding and enhanced convolutional long short‐term memory
Published 2021-06-01“…First, DeepSN uses an enhanced hierarchical convolutional neural network combined with code‐embedding to automatically extract the top‐notch features of the source code and to learn useful semantic information. …”
Get full text
Article -
959
Two-Stage Solution for Meal Delivery Routing Optimization on Time-Sensitive Customer Satisfaction
Published 2022-01-01“…In the first stage, a large number of meal orders are hierarchically classified and merged into delivery bundles based on the nearest pickup location rule by applying the hierarchical agglomerative clustering (HAC) algorithm, to increase fast meal delivery efficiency. …”
Get full text
Article -
960
A Flexile and High Precision Calibration Method for Binocular Structured Light Scanning System
Published 2014-01-01“…The principle of the proposed method is based on hierarchical self-calibration and bundle adjustment. …”
Get full text
Article