Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- Mass media 2
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- Research 2
- Agriculture 1
- Anesthesiology 1
- Communication in rehabilitation 1
- Corporate culture 1
- Descriptive cataloging 1
- Economic aspects 1
- Electronic circuits 1
- Examinations, questions, etc 1
- Medical rehabilitation 1
- Nursing 1
- Nursing Assessment 1
- Nursing Care 1
- Organizational behavior 1
- Organizational sociology 1
- Perioperative Nursing 1
- Regression analysis 1
- Rehabilitation 1
- Social sciences 1
- Standards 1
- Statistical methods 1
- Surgical nursing 1
- Telecommunication in medicine 1
- Telemedicine 1
-
3361
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01“…The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. …”
Get full text
Article -
3362
Green’s relations for 2 × 2 matrices over linearly ordered abelian groups
Published 2025-02-01“…We consider semigroups of 2 Ã 2 matrices over linearly ordered abelian groups with respect to multiplication, which is defined similarly to tropical algebra. …”
Get full text
Article -
3363
Dynamics of a Slab in the Roof of a Buried Structure When the Stiffness of its Supports is Varied
Published 2024-12-01“…The impulsive impact was represented as a multiplication of a constant and a series of time-varying unit functions. …”
Get full text
Article -
3364
Genetic factors for breast carcinogenesis
Published 2016-12-01“…Breast cancer is a multifactorial genenetic disease in which oncogenes derived from normal cellular genes intervene, which constitute positive signals of cellular proliferation and tumour suppressor genes and represent negative signals of cells multiplication and differentiation. Although these alterations which affect germinal cells produce inherited cancers, in most of the cases somatic cell genes are affected. …”
Get full text
Article -
3365
PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark
Published 2016-05-01“…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
Get full text
Article -
3366
Some New Results for the $\mathscr{M}$-Transform Involving the Incomplete $I$-Functions
Published 2024-03-01“…In this paper, $\mathscr{M}$-transform is applied to establish the image formula for the multiplication of a family of polynomials and incomplete $I$-functions. …”
Get full text
Article -
3367
Anomalous entropy-driven kinetics of dislocation nucleation
Published 2025-01-01“…Abstract The kinetics of dislocation reactions, such as dislocation multiplication, controls the plastic deformation in crystals beyond their elastic limit, therefore critical mechanisms in a number of applications in materials science. …”
Get full text
Article -
3368
Intercambios artísticos en una diócesis transfronteriza
Published 2022-01-01“…After that, they tried to rebuild their cathedral buildings: first Braga, with an initial project largely destroyed around 1110 and then Tui after a period of relocation in the monastery of San Bartolomé. The multiplication of donations allows us to think that the new cathedral of Tui began around 1125, with a transept of three naves, similar to that of the cathedral of Santiago and the initial one in Braga, as well as a five-apse chevet, similar to the one proposed by the new bracarense project. …”
Get full text
Article -
3369
Travelling wave solutions to some PDEs of mathematical physics
Published 2004-01-01“…Nonlinear operations such as multiplication of distributions are not allowed in the classical theory of distributions. …”
Get full text
Article -
3370
O papel dos burocratas de nível da rua na implementação de políticas intersetoriais: articulação dos programas sociais e de acesso à água no Semiárido brasileiro
Published 2021-06-01“…Despite its intersectoral and integrated approach with social policies, the multiplication of institutional arrangements and programs with distinct logics of implementation has increased their level of fragmentation. …”
Get full text
Article -
3371
Preconditioning Filter Bank Decomposition Using Structured Normalized Tight Frames
Published 2015-01-01“…We start with a given generalized frame whose elements allow for fast matrix vector multiplication, as, for instance, convolution operators, and compute a normalized tight frame, for which signal analysis and synthesis still preserve those fast algorithmic schemes.…”
Get full text
Article -
3372
A Generalization of Hermite–Hadamard–Fejer Type Inequalities for the p-Convex Function via α-Generator
Published 2023-01-01“…From 1967 to 1970, Michael Grossman and Robert Katz gave definitions of a new kind of derivative and integral, converting the roles of subtraction and addition into division and multiplication, respectively. And then they generalised this operation. …”
Get full text
Article -
3373
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article -
3374
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01“…To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.…”
Get full text
Article -
3375
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01“…Digital signature scheme Aigis-sig, constructed on ideal lattice, takes the advantages of high efficiency, short signature length and resistant to quantum attack, etc.An optimized modular multiplication arithmetic component was constructed and a compact hardware architecture for polynomial operation over a ring based on number theory transformation (NTT) algorithm for Aigis-sig was designed.Besides, based on this architecture, software/hardware co-design and implementation for Aigis-sig scheme on FPGA platform in cryptography was proposed.Experimental results show that the speed of signature phase and verification phase are increased by about 26% and 17% respectively, compared with the pure software implementation on Xilinx Zynq-7000 SoC platform when CPU clock frequency and hardware clock frequency are set as 666.66MHz and 150 MHz respectively.…”
Get full text
Article -
3376
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01“…ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElGamal variant was also proposed,then the correctness,security and the complexity of computation and communication of the protocol were analyzed to extend the application of thinking to secure two-party line segments intersection scheme.Compared with the similar protocol of solving the geometric problem,a kind of secure two-party computation protocol based on homomorphic encryption system without using the oblivious transfer protocol and the millionaires protocol was put forward,which holds higher efficiency and a lower burden of communication.…”
Get full text
Article -
3377
Full Wave Modeling of Array Structures Using Generalized Single-Source Tangential Equivalence Principle Algorithm
Published 2017-01-01“…Furthermore, the multilevel fast multipole algorithm (MLFMA) is used to accelerate the matrix-vector multiplication in the GSST-EPA. Several numerical results are given to demonstrate the accuracy and efficiency of the proposed method.…”
Get full text
Article -
3378
Enhanced Performance of New Scaling-Free CORDIC for Memory-Based Fast Fourier Transform Architecture
Published 2025-01-01“…In the FFT architecture, the CORDIC cell performs all the multiplication of twiddle factor. Therefore, the complex constant multiplier required to execute the twiddle factor multiplication is eliminated. …”
Get full text
Article -
3379
Based on linear systolic array for convolutional neural network’s calculation optimization and performance analysis
Published 2018-12-01“…Concerning the issue that the convolutional neural network (CNN) accelerator design on most FPGA ends fails to effectively use the sparsity and considering both bandwidth and energy consumption,two improved CNN calculation optimization strategies based on linear systolic array architecture are proposed.Firstly,convolution is transformed into matrix multiplication to take advantage of sparsity.Secondly,in order to solve the problem of large I/O demand in traditional parallel matrix multiplier,linear systolic array is used to improve the design.Finally,a CNN acceleration comparative analysis of the advantages and disadvantages between parallel matrix multiplier and two improved linear systolic arrays is presented.Theoretical proof and analysis show that compared with the parallel matrix multiplier,the two improved linear systolic arrays make full use of sparsity,and have the advantages of less energy consumption and less I/O bandwidth occupation.…”
Get full text
Article -
3380
Mesenchymal Stem Cells and Tissue Bioengineering Applications in Sheep as Ideal Model
Published 2024-01-01“…MSCs have increasingly been used in generative medicine due to their specialized self-renewal, immunomodulation, multiplication, and differentiation properties. To further expand the potential of these cells in tissue repair, significant efforts are currently dedicated to the production of biomaterials with desirable short- and long-term biophysical properties that can aid the differentiation and expansion of MSCs. …”
Get full text
Article