Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
10101
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
10102
Therapeutic potential and mechanism of functional oligosaccharides in inflammatory bowel disease: a review
Published 2023-11-01Get full text
Article -
10103
Influence of Quantity and Quality of Bonding Phases on Strength of Iron Ore Sinters
Published 2025-01-01Get full text
Article -
10104
A Design Method of Inland River Channel Based on Hydrodynamic Response of Ship
Published 2025-01-01Get full text
Article -
10105
-
10106
-
10107
Low Carbon Operation Optimization of lntegrated Energy System with Reversible Solid Oxide Cell
Published 2025-01-01Get full text
Article -
10108
-
10109
Raising public awareness on anthropogenic underwater noise by means of playful activities and serious games
Published 2025-02-01“…The system we developed makes it possible to gradually reduce the volume of the noise and increase the volume of the sound until it becomes intelligible. The team that identifies more sounds wins. …”
Get full text
Article -
10110
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…The paper proposes an intelligent gateway-based verification and approval system to protect health data from IoT wearable devices, a key worldwide data security risk. …”
Get full text
Article -
10111
-
10112
Elucidating the potential of EGFR mutated NSCLC and identifying its multitargeted inhibitors
Published 2025-01-01Get full text
Article -
10113
The Preparation of C-S-H Powder Seeds and Their Effect on the Early Hydration Performance of Cement Paste
Published 2025-01-01Get full text
Article -
10114
Evaluation of the practical application of the category-imbalanced myeloid cell classification model.
Published 2025-01-01“…This study provided an important reference for the study of bone marrow cell classification and a practical application of the model, promoting the development of the intelligent classification of AML.…”
Get full text
Article -
10115
QTFN: A General End-to-End Time-Frequency Network to Reveal the Time-Varying Signatures of the Time Series
Published 2024-09-01Get full text
Article -
10116
Durability and microstructure of waste slurry based geopolymer concrete
Published 2025-01-01Get full text
Article -
10117
-
10118
-
10119
Gradient Amplification: An Efficient Way to Train Deep Neural Networks
Published 2020-09-01Get full text
Article -
10120
ViPErLEED package I: Calculation of I(V) curves and structural optimization
Published 2025-01-01“…Added functionalities include intelligent structure-dependent defaults for most calculation parameters, automatic detection of bulk and surface symmetries and their relationship, automated search procedures that preserve the symmetry and speed up convergence, adjustments to the TensErLEED code to handle larger systems than before, as well as parallelization and optimization. …”
Get full text
Article