Showing 2,441 - 2,460 results of 3,741 for search '(( resources utilization function ) OR ( (source OR sources) utilization function ))', query time: 0.18s Refine Results
  1. 2441
  2. 2442

    An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks by Hongyun Xu, Ding Wang, Shigen Shen, Youqun Shi, Qiying Cao

    Published 2016-05-01
    “…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
    Get full text
    Article
  3. 2443
  4. 2444

    UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems by Ziad Akiirne, Abdellah Sghir, Driss Bouzidi

    Published 2024-12-01
    “…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
    Get full text
    Article
  5. 2445

    A Robust InSAR-DEM Block Adjustment Method Based on Affine and Polynomial Models for Geometric Distortion by Zhonghua Hong, Ziyuan He, Haiyan Pan, Zhihao Tang, Ruyan Zhou, Yun Zhang, Yanling Han, Jiang Tao

    Published 2025-04-01
    “…To mitigate this problem, this study employs affine models and polynomial function models to refine the relative planar precision and elevation accuracy of the DEM. …”
    Get full text
    Article
  6. 2446

    Diagnosis and management of a giant retroperitoneal hematoma compressing the femoral nerve, following an ultrasound-guided lumbar sympathetic block: a case report by Yan Bai, Xinqiao Zhou, Lingqing Zeng, Xiaokai Zhou, Zhuqing Rao, Cunming Liu, Yinbing Pan, Xiaodi Sun

    Published 2025-02-01
    “…Once imaging supports the diagnosis, immediate digital subtraction angiography (DSA) could be utilized to identify the bleeding source and conduct embolization.…”
    Get full text
    Article
  7. 2447

    Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives. by Adam W Green, Larissa L Bailey

    Published 2015-01-01
    “…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
    Get full text
    Article
  8. 2448

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  9. 2449
  10. 2450

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  11. 2451

    Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah by Ravika Ramadayani, Irwan Nasution, Armansyah Matondang

    Published 2018-07-01
    “…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
    Get full text
    Article
  12. 2452

    Insights into the diversity and conservation of the chB6 alloantigen by Phillip E. Funk

    Published 2025-02-01
    “…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
    Get full text
    Article
  13. 2453

    Control of Clostridioides difficile virulence and physiology by the flagellin homeostasis checkpoint FliC-FliW-CsrA in the absence of motility by Duolong Zhu, Katherine J. Wozniak, Firas Midani, Shaohui Wang, Xingmin Sun, Robert A. Britton

    Published 2025-03-01
    “…Furthermore, disruption of the fliC-fliW-csrA network results in significant changes in carbon source utilization and sporulation. This work highlights that key proteins involved in flagellar biosynthesis retain their regulatory roles in C. difficile pathogenesis and physiology independent of their functions in motility.IMPORTANCEClostridioides difficile is a leading cause of nosocomial antibiotic-associated diarrhea in developed countries with many known virulence factors. …”
    Get full text
    Article
  14. 2454

    Whole-genome sequencing and genomic analysis of four Akkermansia strains newly isolated from human feces by Wenjing Lu, Biqing Zha, Jie Lyu, Chenxi LingHu, Jing Chen, Sisi Deng, Xiangling Zhang, Liang Li, Guoqing Wang

    Published 2024-12-01
    “…These bacteria colonize the mucus layer of the gastrointestinal tract and utilize mucin as their sole source of carbon and nitrogen. …”
    Get full text
    Article
  15. 2455

    ANALYSIS OF BUSINESS STRATEGY DEVELOPMENT IN CAMPUS INTELLECTUAL PRODUCTS by Rucheni Rucheni, Moh Mukhsin, Diqbal Satyanegara

    Published 2025-03-01
    “…This study produced 7 alternative strategies, including implementing online business strategies and utilizing technology effectively, utilizing and maximizing cooperation with educational institutions, improving management quality, improving product features, improving product image and competitive advantages to have competitiveness, improving product quality, differentiating products appropriately, and managing all resources appropriately and efficiently. …”
    Get full text
    Article
  16. 2456

    The Interface Between Innovation and Entrepreneurship with Strategic Risks and the Budget in a Brazilian Agribusiness Company by Thiago Bruno de Jesus Silva, Carlos Eduardo Facin Lavarda

    Published 2024-01-01
    “…The study suggests that the interface between dynamic capabilities (entrepreneurship and innovation) and strategic risks fosters discussions focused on optimizing budget utility. Moreover, the budget was observed to function as an interactive environment that facilitates the exchange of information and experiences, which in turn supports the development of innovative solutions to strategic risks, such as the creation of a digital platform and the organization of field day events. …”
    Get full text
    Article
  17. 2457

    Versatile graceful degradation framework for bio-inspired proprioception with redundant soft sensors by Taku Sugiyama, Kyo Kutsuzawa, Dai Owaki, Elijah Almanzor, Fumiya Iida, Mitsuhiro Hayashibe

    Published 2025-01-01
    “…Nevertheless, soft sensors are fragile and are susceptible to various damage sources in such environments. Some researchers have utilized redundant configuration, where healthy sensors compensate instantaneously for lost ones to maintain proprioception accuracy. …”
    Get full text
    Article
  18. 2458

    Design and Implementation of a Low-Cost Controlled-Environment Growth Chamber for Vegetative Propagation of Mother Plants by Jacqueline Guerrero-Sánchez, Carlos Alberto Olvera-Olvera, Luis Octavio Solis-Sánchez, Ma. Del Rosario Martínez-Blanco, Manuel de Jesús López-Martínez, Celina Lizeth Castañeda-Miranda, Genaro Martin Soto-Zarazúa, Germán Díaz-Flórez

    Published 2025-06-01
    “…The design features a removable tray that serves as a support for the mother plant, an observation window covered by a movable dark acrylic that prevents the passage of external light, and a vertical structure that facilitates optimal space utilization and ergonomic access. Functionality was conducted using a <i>Stevia rebaudiana</i> Bertoni mother plant maintained for 30 days under monitored conditions. …”
    Get full text
    Article
  19. 2459
  20. 2460

    The Modified Sparrow Search Algorithm with Brown Motion and Levy Flight Strategy for the Class Integration Test Order Generation Problem by Chongyang Jiao, Qinglei Zhou, Wenning Zhang, Chunyan Zhang

    Published 2025-03-01
    “…Using the overall stubbing complexity as a fitness function to evaluate different class test sequences, experiments are conducted on open-source Java systems, and the experimental results demonstrate that the MSSA generates test orders with lower stubbing cost in a shorter time than other novel intelligent algorithms. …”
    Get full text
    Article