-
2561
Comparative analysis of metal-organic frameworks (MOFs) in photocatalysis and electrocatalytic CO2 reduction
Published 2025-01-01“…With the acceleration of global industrialization, the sharp increase in carbon dioxide (CO2) emissions has emerged as a pivotal factor exacerbating the greenhouse effect and global warming, necessitating urgent measures for emission reduction and resource utilization. Consequently, this area has become a focal point of international research efforts. …”
Get full text
Article -
2562
A model for shale gas well production prediction based on improved artificial neural network
Published 2023-08-01Get full text
Article -
2563
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks
Published 2016-05-01“…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
Get full text
Article -
2564
Target pursuit for multi-AUV system: zero-sum stochastic game with WoLF-PHC assisted
Published 2025-03-01Get full text
Article -
2565
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
Published 2024-12-01“…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
Get full text
Article -
2566
Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives.
Published 2015-01-01“…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
Get full text
Article -
2567
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2568
Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA
Published 2025-07-01Get full text
Article -
2569
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2570
Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah
Published 2018-07-01“…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
Get full text
Article -
2571
Insights into the diversity and conservation of the chB6 alloantigen
Published 2025-02-01“…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
Get full text
Article -
2572
Whole-genome sequencing and genomic analysis of four Akkermansia strains newly isolated from human feces
Published 2024-12-01“…These bacteria colonize the mucus layer of the gastrointestinal tract and utilize mucin as their sole source of carbon and nitrogen. …”
Get full text
Article -
2573
ANALYSIS OF BUSINESS STRATEGY DEVELOPMENT IN CAMPUS INTELLECTUAL PRODUCTS
Published 2025-03-01“…This study produced 7 alternative strategies, including implementing online business strategies and utilizing technology effectively, utilizing and maximizing cooperation with educational institutions, improving management quality, improving product features, improving product image and competitive advantages to have competitiveness, improving product quality, differentiating products appropriately, and managing all resources appropriately and efficiently. …”
Get full text
Article -
2574
The Interface Between Innovation and Entrepreneurship with Strategic Risks and the Budget in a Brazilian Agribusiness Company
Published 2024-01-01“…The study suggests that the interface between dynamic capabilities (entrepreneurship and innovation) and strategic risks fosters discussions focused on optimizing budget utility. Moreover, the budget was observed to function as an interactive environment that facilitates the exchange of information and experiences, which in turn supports the development of innovative solutions to strategic risks, such as the creation of a digital platform and the organization of field day events. …”
Get full text
Article -
2575
Submillimeter and Mid-infrared Variability of Young Stellar Objects in the M17 H II Region
Published 2025-01-01“…This mid-IR fractional variability as a function of evolutionary stage result is similar to what has previously been found for YSO variability within the Gould Belt and the intermediate-mass star formation region M17 SWex, though overall less variability is detected in M17 in submillimeter and mid-IR. …”
Get full text
Article -
2576
Efficiency-Centered Fault Diagnosis of In-Service Induction Motors for Digital Twin Applications: A Case Study on Broken Rotor Bars
Published 2024-09-01“…The uninterrupted operation of induction motors is crucial for industries, ensuring reliability and continuous functionality. To achieve this, we propose an innovative approach that utilizes an efficiency model-based digital shadow system for in situ failure detection and diagnosis (FDD) in induction motors (IMs). …”
Get full text
Article -
2577
Nixtamalization and Extrusion Processes: Effects on Physicochemical, Nutritional, and Nutraceutical Properties in the Processing of Corn Into Tortilla
Published 2025-01-01“…Tortillas are a significant component of the Mexican diet, serving as a major source of protein and energy. The average consumption of nixtamalized corn tortillas in Mexico is around 80 kg per capita per year. …”
Get full text
Article -
2578
-
2579
Altering endogenous cytokinin content by GmCKX13 as a strategy to develop drought-tolerant plants
Published 2024-12-01Get full text
Article -
2580
Leveraging Blockchain Technology With Enhanced MDSVA for Robust Meteorological Sensor Data Validation
Published 2025-01-01“…The system maintained 99.99% uptime with 4.2 second recovery time and demonstrated robust resilience by handling up to 30% simultaneous node failures while keeping resource utilization below 85%. This research contributes to the field of meteorological data quality assurance by providing a robust, mathematically sound, and technologically advanced solution that meets the growing demands of modern weather monitoring systems.…”
Get full text
Article