-
2081
Electrochemical Performance and Time Stability of the Solid Oxide Cells with a (La,Sr)(Ga,Fe,Mg)O<sub>3−δ</sub> Electrolyte and (La,Sr)(Fe,Ga,Mg)O<sub>3−δ</sub> Electrodes
Published 2025-06-01“…Electrochemical devices on solid electrolytes are closely considered from the point of view of efficient utilization of environmental resources in order to obtain a variety of products, including those with high added cost. …”
Get full text
Article -
2082
-
2083
Effect of Sea Buckthorn Pomace Addition on the Quality and Digestive Attributes of Noodles
Published 2025-05-01“…This study provided a theoretical framework for the development of functional noodles based on effective utilization of resources and developmental trends in food nutrition and health. …”
Get full text
Article -
2084
Does the chronic care model meet the emerging needs of people living with multimorbidity? A systematic review and thematic synthesis.
Published 2018-01-01“…Few implementations aimed at improving functional status or quality of life, and only one-third of studies were targeted for patients of low socioeconomic status.…”
Get full text
Article -
2085
-
2086
High-pressure processing of Porphyra sp.: A sustainable approach for enhanced protein and phycobiliprotein extraction and nutritional quality
Published 2025-06-01“…These findings suggest that HPP is a promising green technology for producing cost-effective alternative proteins with superior functional and nutritional properties. Moreover, it promotes the sustainable utilization of marine resources, aligning with both environmental and economic goals.…”
Get full text
Article -
2087
-
2088
A model for shale gas well production prediction based on improved artificial neural network
Published 2023-08-01Get full text
Article -
2089
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks
Published 2016-05-01“…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
Get full text
Article -
2090
Target pursuit for multi-AUV system: zero-sum stochastic game with WoLF-PHC assisted
Published 2025-03-01Get full text
Article -
2091
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
Published 2024-12-01“…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
Get full text
Article -
2092
Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives.
Published 2015-01-01“…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
Get full text
Article -
2093
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2094
Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA
Published 2025-07-01Get full text
Article -
2095
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2096
Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah
Published 2018-07-01“…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
Get full text
Article -
2097
Insights into the diversity and conservation of the chB6 alloantigen
Published 2025-02-01“…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
Get full text
Article -
2098
Utilisation of mucin glycans by the human gut symbiont Ruminococcus gnavus is strain-dependent.
Published 2013-01-01“…Commensal bacteria often have an especially rich source of glycan-degrading enzymes which allow them to utilize undigested carbohydrates from the food or the host. …”
Get full text
Article -
2099
Integration of artificial intelligence and advanced optimization techniques for continuous gas lift under restricted gas supply: A case study
Published 2025-03-01“…To this end, 154 data points constructed by a central composite design (CCD) experiment were utilized to develop neural network models. Therefore, four robust models, including multilayer perceptron (MLP), radial basis function (RBF), general regression neural network (GRNN), and cascade forward neural network (CFNN), were implemented for modeling. …”
Get full text
Article -
2100