Suggested Topics within your search.
Suggested Topics within your search.
- Ability 2
- Artificial intelligence 2
- Children 2
- Intelligence testing 2
- Intelligence tests 2
- Leadership 2
- Testing 2
- Artificial Intelligence 1
- Business 1
- Business and Management 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Computer programs 1
- Computer-assisted instruction 1
- Conditioned response 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Data processing 1
- Desertions 1
- Ego (Psychology) 1
- Emotional conditioning 1
- Entrepreneurship 1
- Führung 1
- History 1
- Intelligence service 1
- Intelligent control systems 1
- International business enterprises 1
- Internet marketing 1
- Intranets (Computer networks) 1
- Knowledge management 1
-
10201
-
10202
First aid guidelines for fragile contexts (conflict, disaster and remote areas): Contextualization & Adaptation
Published 2022-07-01“…Important, but not yet explicit enough in the new guidelines, is the permission needed to be given to first aid educators to create an authentic, intelligent and humanitarian approach to first aid learning. …”
Get full text
Article -
10203
Quality control and safety management of oil and gas pipelines during its whole life cycle
Published 2023-10-01“…With the extensive application of automatic and intelligent technologies, the construction level and engineering quality of pipelines have been significantly improved. …”
Get full text
Article -
10204
Control System of Fire Rescue Robot for High-Rise Building Design
Published 2022-01-01Get full text
Article -
10205
Construction of functional covalent organic framework films by modulator and solvent induced polymerization
Published 2025-01-01Get full text
Article -
10206
Drone-View Haze Removal via Regional Saturation-Value Translation and Soft Segmentation
Published 2025-01-01Get full text
Article -
10207
-
10208
Impacts of grade control structures on riverbed degradation
Published 2025-02-01Get full text
Article -
10209
-
10210
Pole-to-Pole Short-Circuit Categorization for Protection Strategies in Primary Shipboard DC Systems
Published 2024-01-01Get full text
Article -
10211
-
10212
-
10213
-
10214
Autogenous and drying shrinkage properties of precast recycled aggregate concrete
Published 2025-07-01Get full text
Article -
10215
Effects of Grid Voltage and Load Unbalances on the Efficiency of a Hybrid Distribution Transformer
Published 2024-01-01Get full text
Article -
10216
-
10217
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01“…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
Get full text
Article -
10218
-
10219
Urban Rail Transit System Network Reliability Analysis Based on a Coupled Map Lattice Model
Published 2021-01-01Get full text
Article -
10220
Multi-Relational Graph Representation Learning for Financial Statement Fraud Detection
Published 2024-09-01Get full text
Article