Showing 41,701 - 41,720 results of 68,043 for search '"technology"', query time: 0.26s Refine Results
  1. 41701

    Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption by Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI

    Published 2023-05-01
    “…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
    Get full text
    Article
  2. 41702

    Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128 by Jie CUI, Hai-feng ZUO, Hong ZHONG

    Published 2017-11-01
    “…I-PRESENT was a lightweight SPN block cipher for resource-constraint environments such as RFID tags and sensor networks.The biclique structures of I-PRESENT with sieve-in-the-middle technique was an constracted.The biclique cryptanalysis schemes on full-round I-PRESENT-80 and I-PRESENT-128 were proposed for the first time.The results show that the data complexity of the biclique cryptanalysis on I-PRESENT-80 and I-PRESENT-128 is 2 <sup>26</sup> and 2<sup>36</sup> chosen ciphertexts respectively,and the time complexity on them is 2 <sup>79.48</sup> and 2 <sup>127.33</sup> encryptions respectively.The time and data complexity are better than that of the exhaustive attack.In addition,the time complexity on them can be reduced to 2 <sup>78.61</sup> and 2<sup>126.48</sup> encryptions by using related-key technology of I-PRESENT.…”
    Get full text
    Article
  3. 41703
  4. 41704
  5. 41705

    Trusted edge computing for smart healthcare by Shaoliang PENG, Liang BAI, Li WANG, Minxia CHENG, Shulin WANG

    Published 2020-06-01
    “…With the rapid development of internet of things technology,in order to better develop modern medicine,avoid the “isolated” crisis of information,and meet the requirements of timeliness and computing performance of massive data generated by edge devices,it is a new trend of the times to combine edge computing with smart healthcare treatment.However,edge computing has a certain degree of openness,and it is prone to potential safety hazards.Therefore,people pay more and more attention to the security and privacy protection of edge computing system for smart healthcare treatment.The edge computing system and its architecture for smart healthcare were introduced,and the security risks encountered by smart healthcare in edge computing was explained,and some scholars’ solutions to the security risks were introduced.Finally,a security framework,and specific solutions for security and privacy protection under the framework were put forward,which providing some help for the trusted research of smart healthcare edge computing.…”
    Get full text
    Article
  6. 41706

    Remaining of contrast dye ice cap during PVI by cryoballoon ablation; a case report by Ahmad Yamini Sharif, Entezar Mehrabi Nasab

    Published 2025-01-01
    “…Abstract Pulmonary vein isolation (PVI) with cryoballoon (CB) ablation technology is widely used to treat drug-resistant atrial fibrillation (AF). …”
    Get full text
    Article
  7. 41707

    Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering by HU Hong-chao, GUO Yun-fei, PANG lin, BU You-jun

    Published 2011-01-01
    “…Due to its outstanding extensibility performance,the LB-BvN switch had attracted much attention recently in the switching technology academia.However,the problem that it might disturb the sequences of packets made it not so applicable in practice.To overcome this,the principles for guaranteeing packets in order switching were first discussed.Then,based on these principles,it focused on research on the transmission characteristics in network traffic and came up with DFA and DFS algorithms.DFA assigned the switching paths to each flow based on their transport layer parameters to make sure that each packet in the flow were in order.DFS was more sophisticated than DFA in that it first divided flows into flowlets.In this way,the flowlets in the flows were in order.Both DFA and DFS could achieve in order packets switching with limited flow states maintained in the line-cards.Simulation results show that both DFA and DFS can achieve good performance.…”
    Get full text
    Article
  8. 41708
  9. 41709
  10. 41710

    A ANALISIS SENTIMEN PARA KANDIDAT PILPRES 2024 DENGAN MODEL BAHASA BERT by LUIS RICARDO PANDIANGAN, IGN LANANG WIJAYAKUSUMA

    Published 2024-11-01
    “…With the advancement of technology, each candidate has utilized social media to engage with the voters. …”
    Get full text
    Article
  11. 41711

    Simulation Analysis of the Forming Process of Tapered Multi-blade Scraper Tool by Guo Erkuo, Ren Naifei, Wang Jie, Zhou Changlu

    Published 2019-01-01
    “…Aiming at the problem of short service life of single-edge tool in powerful tooth skiving technology, a novel skiving tool with multiple blades with higher efficiency is proposed. …”
    Get full text
    Article
  12. 41712
  13. 41713

    An Acquisition Algorithm with NCCFR for BOC Modulated Signals by Yongxin Feng, Fang Liu, Xudong Yao, Xiaoyu Zhang

    Published 2017-01-01
    “…With the development of satellite navigation technology, BOC (Binary Offset Carrier) signals are proposed and applied in navigation system. …”
    Get full text
    Article
  14. 41714

    Diagnosis of Parasitic Diseases: Old and New Approaches by Momar Ndao

    Published 2009-01-01
    “…Few major advances in clinical diagnostic testing have been made since the introduction of PCR, although new technologies are being investigated. Many tests that form the backbone of the “modern” microbiology laboratory are based on very old and labour-intensive technologies such as microscopy for malaria. …”
    Get full text
    Article
  15. 41715

    Didactique des langues-cultures, genre, intersectionnalité et empowerment féministe : un entretien avec Véronique Perry by Véronique Perry, Eléonore de Beaumont

    Published 2023-07-01
    “…Since the publication of her PhD thesis in 2011, Aspects du genre dans la didactique de l’anglais (Aspects of gender in English didactics), she has been developing a hybrid, feminist pedagogical approach to teaching English to science and technology students at the Université Toulouse Paul Sabatier. …”
    Get full text
    Article
  16. 41716

    Bridging the Digital Divide: Fostering STEM Education for Digital Economy Leadership by James Maisiri, Takaedza Simbarashe Madzikanda

    Published 2024-08-01
    “…A digital economy requires a population that is literate in Science, Technology, Engineering, and mathematics (STEM). While BRICS has made progress in educating their populous in these fields, they still have a long way to go. …”
    Get full text
    Article
  17. 41717

    Indoor RFID localization algorithm based on adaptive bat algorithm by Liangbo XIE, Yuyang LI, Yong WANG, Mu ZHOU, Wei NIE

    Published 2022-08-01
    “…Aiming at the problem that long time-consuming and poor positioning accuracy using geometric method in the traditional UHF RFID indoor localization algorithm, an RFID indoor positioning algorithm based on adaptive bat algorithm (ABA) was proposed.Firstly, the phase of multiple frequency points was obtained by frequency hopping technology, and the location evaluation function of bat algorithm was established based on the angle information of multiple signal classification (MUSIC) algorithm and the distance information of clustering.Secondly, the bat location was initialized by tent reverse learning to increase the diversity of the population, and the adaptive weight factor was introduced to update the bat location.Finally, the target position was searched iteratively based on the position evaluation function to achieve fast centimeter level positioning.Experimental results show that the median localization error of the proposed algorithm is 7.74 cm, and the real-time performance is improved by 12 times compared with the traditional positioning algorithm based on the Chinese remainder theorem (CRT).…”
    Get full text
    Article
  18. 41718

    Recycling cathode materials for lithium-ion batteries via Hydro-to-Cathode® method by Jong Hyun Shim

    Published 2025-01-01
    “…Due to the rising price and limited resource supply chain of Li [NixMnyCoz]O2 (x + y + z = 1) (NMC) cathode material, lithium-ion battery (LIB) recycling technologies have been emerging as the best solution to address the price issue. …”
    Get full text
    Article
  19. 41719
  20. 41720