Showing 2,081 - 2,100 results of 3,741 for search '(( (resources OR resources) utilization function ) OR ( (source OR sources) utilization function ))', query time: 0.17s Refine Results
  1. 2081

    Electrochemical Performance and Time Stability of the Solid Oxide Cells with a (La,Sr)(Ga,Fe,Mg)O<sub>3−δ</sub> Electrolyte and (La,Sr)(Fe,Ga,Mg)O<sub>3−δ</sub> Electrodes by Egor Gordeev, Ekaterina Antonova, Denis Osinkin

    Published 2025-06-01
    “…Electrochemical devices on solid electrolytes are closely considered from the point of view of efficient utilization of environmental resources in order to obtain a variety of products, including those with high added cost. …”
    Get full text
    Article
  2. 2082
  3. 2083

    Effect of Sea Buckthorn Pomace Addition on the Quality and Digestive Attributes of Noodles by Yongping QIN, Peng ZENG, Dandan FANG, Lin CHEN

    Published 2025-05-01
    “…This study provided a theoretical framework for the development of functional noodles based on effective utilization of resources and developmental trends in food nutrition and health. …”
    Get full text
    Article
  4. 2084

    Does the chronic care model meet the emerging needs of people living with multimorbidity? A systematic review and thematic synthesis. by Kasey R Boehmer, Abd Moain Abu Dabrh, Michael R Gionfriddo, Patricia Erwin, Victor M Montori

    Published 2018-01-01
    “…Few implementations aimed at improving functional status or quality of life, and only one-third of studies were targeted for patients of low socioeconomic status.…”
    Get full text
    Article
  5. 2085
  6. 2086

    High-pressure processing of Porphyra sp.: A sustainable approach for enhanced protein and phycobiliprotein extraction and nutritional quality by Sukan Braspaiboon, Thunnop Laokuldilok

    Published 2025-06-01
    “…These findings suggest that HPP is a promising green technology for producing cost-effective alternative proteins with superior functional and nutritional properties. Moreover, it promotes the sustainable utilization of marine resources, aligning with both environmental and economic goals.…”
    Get full text
    Article
  7. 2087
  8. 2088
  9. 2089

    An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks by Hongyun Xu, Ding Wang, Shigen Shen, Youqun Shi, Qiying Cao

    Published 2016-05-01
    “…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
    Get full text
    Article
  10. 2090
  11. 2091

    UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems by Ziad Akiirne, Abdellah Sghir, Driss Bouzidi

    Published 2024-12-01
    “…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
    Get full text
    Article
  12. 2092

    Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives. by Adam W Green, Larissa L Bailey

    Published 2015-01-01
    “…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
    Get full text
    Article
  13. 2093

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  14. 2094
  15. 2095

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  16. 2096

    Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah by Ravika Ramadayani, Irwan Nasution, Armansyah Matondang

    Published 2018-07-01
    “…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
    Get full text
    Article
  17. 2097

    Insights into the diversity and conservation of the chB6 alloantigen by Phillip E. Funk

    Published 2025-02-01
    “…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
    Get full text
    Article
  18. 2098

    Utilisation of mucin glycans by the human gut symbiont Ruminococcus gnavus is strain-dependent. by Emmanuelle H Crost, Louise E Tailford, Gwenaelle Le Gall, Michel Fons, Bernard Henrissat, Nathalie Juge

    Published 2013-01-01
    “…Commensal bacteria often have an especially rich source of glycan-degrading enzymes which allow them to utilize undigested carbohydrates from the food or the host. …”
    Get full text
    Article
  19. 2099

    Integration of artificial intelligence and advanced optimization techniques for continuous gas lift under restricted gas supply: A case study by Leila Zeinolabedini, Forough Ameli, Abdolhossein Hemmati-Sarapardeh

    Published 2025-03-01
    “…To this end, 154 data points constructed by a central composite design (CCD) experiment were utilized to develop neural network models. Therefore, four robust models, including multilayer perceptron (MLP), radial basis function (RBF), general regression neural network (GRNN), and cascade forward neural network (CFNN), were implemented for modeling. …”
    Get full text
    Article
  20. 2100