Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 2,021 - 2,040 results of 3,741 for search '(( (resources OR resources) utilization function ) OR ( source utilization function ))', query time: 0.21s Refine Results
  1. 2021

    UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems by Ziad Akiirne, Abdellah Sghir, Driss Bouzidi

    Published 2024-12-01
    “…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
    Get full text
    Article
  2. 2022

    Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives. by Adam W Green, Larissa L Bailey

    Published 2015-01-01
    “…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
    Get full text
    Article
  3. 2023

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  4. 2024
  5. 2025

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  6. 2026

    Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah by Ravika Ramadayani, Irwan Nasution, Armansyah Matondang

    Published 2018-07-01
    “…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
    Get full text
    Article
  7. 2027

    Insights into the diversity and conservation of the chB6 alloantigen by Phillip E. Funk

    Published 2025-02-01
    “…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
    Get full text
    Article
  8. 2028

    Research on Experimental Method for Obtaining Independent Combustion Noise of Internal Combustion Engine by Yang Xiang, Jiachi Yao, Qiang Zhou, Sichong Qian, Shuai Wang

    Published 2018-01-01
    “…The pressure signal and noise signal are utilized to obtain the transfer function of combustion pressure and noise. …”
    Get full text
    Article
  9. 2029

    Integration of artificial intelligence and advanced optimization techniques for continuous gas lift under restricted gas supply: A case study by Leila Zeinolabedini, Forough Ameli, Abdolhossein Hemmati-Sarapardeh

    Published 2025-03-01
    “…To this end, 154 data points constructed by a central composite design (CCD) experiment were utilized to develop neural network models. Therefore, four robust models, including multilayer perceptron (MLP), radial basis function (RBF), general regression neural network (GRNN), and cascade forward neural network (CFNN), were implemented for modeling. …”
    Get full text
    Article
  10. 2030
  11. 2031

    Optimization-Based Distributed Controller for Multi-Agents System in Microgrid Secondary Control by Fahad S. Alshammari, Ayman El-Refaie, Saleh Alyahya, Sheroz Khan

    Published 2025-01-01
    “…Micro-grids function to connect to power system power produced by the renewable energy resources. …”
    Get full text
    Article
  12. 2032

    Transgenic poplar for resistance against pest and pathogen attack in forests: an overview by Swati Sharan, Amrita Chakraborty, Amit Roy, Indrakant K. Singh, Archana Singh, Archana Singh

    Published 2024-12-01
    “…These plants provide wood, which can be utilized as raw resources for the paper industry and as a potential source of biofuel. …”
    Get full text
    Article
  13. 2033

    Development of Reliability Indices for Electric Distribution Network in Egypt by Eman Ahmed, Sherein Abdualla, Kamelia Youssef, Hatem Waheed

    Published 2017-03-01
    “…</p><p class="IndexTerms">The main function of electric system is to supply customers with electric energy that has an acceptable degree of reliability and quality. …”
    Get full text
    Article
  14. 2034

    EZSCAN for undiagnosed type 2 diabetes mellitus: A systematic review and meta-analysis. by Antonio Bernabe-Ortiz, Andrea Ruiz-Alejos, J Jaime Miranda, Rohini Mathur, Pablo Perel, Liam Smeeth

    Published 2017-01-01
    “…OVID (Medline, Embase, Global Health), CINAHL and SCOPUS databases, plus secondary resources, were searched until March 29, 2017. The following keywords were utilized for the systematic searching: type 2 diabetes mellitus, hyperglycemia, EZSCAN, SUDOSCAN, and sudomotor function. …”
    Get full text
    Article
  15. 2035

    SSDWSN: A Scalable Software-Defined Wireless Sensor Networks by Mohammed Alsaeedi, Mohd Murtadha Mohamad, Anas Al-Roubaiey

    Published 2024-01-01
    “…These policies are designed to efficiently utilize SDWSN network resources and accurately predict the network state by continuously monitoring the synchronized network state within the controller, taking appropriate actions, and updating the learning parameters based on reward functions. …”
    Get full text
    Article
  16. 2036

    A community-engaged model for promoting youth behavioral health equity: voices from Washington State’s Community Prevention and Wellness Initiative by Heather F. Terral, Jordan Newburg, Konul Karimova, Brittany R. Cooper, Gitanjali Shrestha

    Published 2025-08-01
    “…The Community Prevention and Wellness Initiative (CPWI) is an innovative community coalition model that uses data to direct prevention efforts and resources to the highest-need communities in Washington State to reduce youth behavioral health disparities. …”
    Get full text
    Article
  17. 2037
  18. 2038

    A Numerical Investigation of Enhanced Microfluidic Immunoassay by Multiple-Frequency Alternating-Current Electrothermal Convection by Qisheng Wu, Shaohua Huang, Shenghai Wang, Xiying Zhou, Yuxuan Shi, Xiwei Zhou, Xianwu Gong, Ye Tao, Weiyu Liu

    Published 2025-04-01
    “…Through thorough numerical simulation, the optimal working frequencies for SWET and TWET are determined, and the resulting synthetic MET flow field is directly utilized for microfluidic immunoassay. MET significantly promotes the binding kinetics on functionalized electrode surface by simultaneous global electrokinetic transport along channel length direction and local chaotic stirring of antigen samples near the reaction site, compared to the situation without flow activation. …”
    Get full text
    Article
  19. 2039

    ANALYSIS OF BUSINESS STRATEGY DEVELOPMENT IN CAMPUS INTELLECTUAL PRODUCTS by Rucheni Rucheni, Moh Mukhsin, Diqbal Satyanegara

    Published 2025-03-01
    “…This study produced 7 alternative strategies, including implementing online business strategies and utilizing technology effectively, utilizing and maximizing cooperation with educational institutions, improving management quality, improving product features, improving product image and competitive advantages to have competitiveness, improving product quality, differentiating products appropriately, and managing all resources appropriately and efficiently. …”
    Get full text
    Article
  20. 2040

    The Interface Between Innovation and Entrepreneurship with Strategic Risks and the Budget in a Brazilian Agribusiness Company by Thiago Bruno de Jesus Silva, Carlos Eduardo Facin Lavarda

    Published 2024-01-01
    “…The study suggests that the interface between dynamic capabilities (entrepreneurship and innovation) and strategic risks fosters discussions focused on optimizing budget utility. Moreover, the budget was observed to function as an interactive environment that facilitates the exchange of information and experiences, which in turn supports the development of innovative solutions to strategic risks, such as the creation of a digital platform and the organization of field day events. …”
    Get full text
    Article