Showing 2,701 - 2,720 results of 3,741 for search '(( (source OR (resources OR sources)) utilization function ) OR ( sources utilization function ))', query time: 0.29s Refine Results
  1. 2701

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  2. 2702
  3. 2703

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  4. 2704

    Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah by Ravika Ramadayani, Irwan Nasution, Armansyah Matondang

    Published 2018-07-01
    “…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
    Get full text
    Article
  5. 2705

    Insights into the diversity and conservation of the chB6 alloantigen by Phillip E. Funk

    Published 2025-02-01
    “…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
    Get full text
    Article
  6. 2706

    ANALYSIS OF BUSINESS STRATEGY DEVELOPMENT IN CAMPUS INTELLECTUAL PRODUCTS by Rucheni Rucheni, Moh Mukhsin, Diqbal Satyanegara

    Published 2025-03-01
    “…This study produced 7 alternative strategies, including implementing online business strategies and utilizing technology effectively, utilizing and maximizing cooperation with educational institutions, improving management quality, improving product features, improving product image and competitive advantages to have competitiveness, improving product quality, differentiating products appropriately, and managing all resources appropriately and efficiently. …”
    Get full text
    Article
  7. 2707

    The Interface Between Innovation and Entrepreneurship with Strategic Risks and the Budget in a Brazilian Agribusiness Company by Thiago Bruno de Jesus Silva, Carlos Eduardo Facin Lavarda

    Published 2024-01-01
    “…The study suggests that the interface between dynamic capabilities (entrepreneurship and innovation) and strategic risks fosters discussions focused on optimizing budget utility. Moreover, the budget was observed to function as an interactive environment that facilitates the exchange of information and experiences, which in turn supports the development of innovative solutions to strategic risks, such as the creation of a digital platform and the organization of field day events. …”
    Get full text
    Article
  8. 2708

    MergeBot: A platform of semi-structured merge conflict resolution for C/C++ code by Hua He, Xiaofan Liu, Lei Xu, Guanghui Mei, Jifeng Xuan

    Published 2025-05-01
    “…In software version control systems, like Git, merge conflicts typically arise when multiple developers edit the same segment of a source file from different branches. Detecting merge conflicts can be automated; however, resolving merge conflicts is tedious and demanding. …”
    Get full text
    Article
  9. 2709

    Chemical Composition and Antioxidant Properties of Peels of Five Pumpkin (<i>Cucurbita</i> sp.) Species by Małgorzata Stryjecka

    Published 2025-06-01
    “…By-products from the fruit and vegetable processing industry represent a substantial source of bioactive compounds, which can be extracted and utilized in the development of functional foods or nutraceuticals, thereby contributing to sustainable nutrition and waste valorization. …”
    Get full text
    Article
  10. 2710

    Estimation of Positive‐, Negative‐, and Zero‐Sequence Current and Voltage Phasors of UIPC VSCs for Short‐Circuit Faults in Transmission Lines by Babak Bahadori, Ali Nahavandi, Mahyar Abasi

    Published 2025-02-01
    “…ABSTRACT FACTS devices, functioning as controlled series voltage and parallel current source converters in transmission lines, can enhance network flexibility. …”
    Get full text
    Article
  11. 2711

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…The study draws on both theoretical and empirical sources, utilizing qualitative analysis to examine trends in the use of generative AI in different types of library services. …”
    Get full text
    Article
  12. 2712
  13. 2713

    µID-TIMS: spatially resolved high-precision U–Pb zircon geochronology by S. Markovic, J.-F. Wotzlaw, D. Szymanowski, J. Reuteler, P. Zeng, C. Chelle-Michou

    Published 2024-11-01
    “…The accuracy and precision of <span class="inline-formula">µ</span>ID-TIMS dates for zircon of any given age depend, as for non-microsampled zircon, on the available mass of U and radiogenic Pb – both a function of sample size. Our accompanying open-source code can aid researchers in estimating the necessary microsample size needed to obtain accurate dates at precision sufficient to resolve the processes under study. …”
    Get full text
    Article
  14. 2714
  15. 2715

    Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation by Md Abdullah Al Mamun, Mei Li, Bijon Kumar Pramanik, Faisal Hussain, A. Z. M. Shakilur Rahman

    Published 2025-01-01
    “…The system maintained 99.99% uptime with 4.2 second recovery time and demonstrated robust resilience by handling up to 30% simultaneous node failures while keeping resource utilization below 85%. This research contributes to the field of meteorological data quality assurance by providing a robust, mathematically sound, and technologically advanced solution that meets the growing demands of modern weather monitoring systems.…”
    Get full text
    Article
  16. 2716

    Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol by Mohammad A. Al Khaldy, Ahmad Nabot, Ahmad al-Qerem, Issam Jebreen, Abdulbasit A. Darem, Asma A. Alhashmi, Mohammad Alauthman, Amjad Aldweesh

    Published 2025-07-01
    “…The RL-based mechanism continuously adapts decision-making by learning from system states, prioritizing transactions, and dynamically resolving conflicts using a reward function that accounts for key performance parameters, including the number of conflicting transactions, cost of aborting transactions, temporal validity constraints, and system resource utilization. …”
    Get full text
    Article
  17. 2717
  18. 2718

    Improving remote sensing dehazing quality through local hybrid correction and optimization of atmospheric attenuation model based on wavelength by Daihong Zhao, Kun Shi, Zheng Li, Zheng Li, Meixiang Chen

    Published 2025-01-01
    “…Near-ground remote sensing image dehazing is crucial for accurately monitoring land resources. An effective dehazing technique and a precise atmospheric attenuation model are fundamental to acquiring real-time ground data with high fidelity. …”
    Get full text
    Article
  19. 2719

    Chromosome-level genome assembly of the endangered tree species Ormosia henryi Prain by Chengchuan Zhou, Qiang Wen, Dan Zeng, Changqing Guo, Zhiwen Guo, Liting Liu, Tianlin Ouyang

    Published 2025-06-01
    “…In total, we predicted 42,260 protein-coding genes, 88.42% of which could be functionally annotated. This genome assembly provides a valuable resource for various applications, including future conservation and utilization, evolutionary studies, and elucidation of pathways involved in key biological traits of O. henryi.…”
    Get full text
    Article
  20. 2720

    Prevalence and persistence of cost-related medication non-adherence before and during the COVID-19 pandemic among medicare patients at high risk of hospitalization. by James X Zhang, David O Meltzer

    Published 2023-01-01
    “…<h4>Conclusion and relevance</h4>There are coherent evidence of a reversal of CRN rates during the COVID-19 pandemic among this high-need, high-cost resource utilization Medicare population. Patients' CRN behaviors may be responsive to exogenous impacts, and the behaviors changed in the same direction with similar magnitude in terms of prevalence (the extensive margin) and persistence (the intensive margin). …”
    Get full text
    Article