Search alternatives:
resources » resourcess (Expand Search)
source » sources (Expand Search)
Showing 2,281 - 2,300 results of 3,741 for search '(( resources utilization function ) OR ( source utilization function ))', query time: 0.14s Refine Results
  1. 2281

    In-Loop Adaptive Filters to Improve the Power Quality of Switched Reluctance Generator in WECS by Elmer O. Hancco Catata, Pedro Jose Dos Santos Neto, Marcelo Vinicius De Paula, Joao Pedro Carvalho Silveira, Tarcio Andre Dos Santos Barros, Ernesto Ruppert Filho

    Published 2022-01-01
    “…The notch cascading and moving average filters are implemented at the voltage loop of the voltage source converter in an adaptive form, as function of the SRG speed. …”
    Get full text
    Article
  2. 2282

    Hamstring vs Peroneus Longus Tendon Autograft in Anterior Cruciate Ligament Reconstruction: A Comparative Study by Khadri M Khalid, Adarsh Vajrangi, Eswara Reddy, Nagesh Sherikar, Rakshith Chakravarthy Harish Yellappa, Ranganatha B Kurupati

    Published 2024-06-01
    “…Conclusion: With regard to its strength, larger graft diameter, satisfactory ankle function, and prevention of potential complications of HT autograft obtained from the knee region, the current study demonstrated that PLT autograft might be considered a safe and practical autograft source for arthroscopic ACLR.…”
    Get full text
    Article
  3. 2283
  4. 2284

    An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks by Hongyun Xu, Ding Wang, Shigen Shen, Youqun Shi, Qiying Cao

    Published 2016-05-01
    “…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
    Get full text
    Article
  5. 2285
  6. 2286

    UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems by Ziad Akiirne, Abdellah Sghir, Driss Bouzidi

    Published 2024-12-01
    “…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
    Get full text
    Article
  7. 2287

    Artificial intelligence analysis in cyber domain: A review by Liguo Zhao, Derong Zhu, Wasswa Shafik, S Mojtaba Matinkhah, Zubair Ahmad, Lule Sharif, Alisa Craig

    Published 2022-04-01
    “…This method permits for the allocation of multiple log source types through a sliding time window and provides a scalable solution, which is a much-needed function.…”
    Get full text
    Article
  8. 2288

    Productivity evaluation of multi-stage fracturing horizontal wells in shale gas reservoir with complex artificial fracture occurrence by HU Zhijian, LI Shuxin, WANG Jianjun, ZHOU Hong, ZHAO Yulong, ZHANG Liehui

    Published 2023-08-01
    “…This model serves as the foundation for establishing a gas reservoir-fracture-wellbore coupled seepage model, utilizing real space source function theory and pressure drawdown superposition principle. …”
    Get full text
    Article
  9. 2289

    Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives. by Adam W Green, Larissa L Bailey

    Published 2015-01-01
    “…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
    Get full text
    Article
  10. 2290

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  11. 2291
  12. 2292

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  13. 2293

    Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah by Ravika Ramadayani, Irwan Nasution, Armansyah Matondang

    Published 2018-07-01
    “…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
    Get full text
    Article
  14. 2294

    Insights into the diversity and conservation of the chB6 alloantigen by Phillip E. Funk

    Published 2025-02-01
    “…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
    Get full text
    Article
  15. 2295

    Cone Beam Micro-CT System for Small Animal Imaging and Performance Evaluation by Shouping Zhu, Jie Tian, Guorui Yan, Chenghu Qin, Jinchao Feng

    Published 2009-01-01
    “…In order to reconstruct images with high spatial resolution and low artifacts, raw data preprocessing and geometry calibration are implemented before reconstruction. A method which utilizes a wire phantom to estimate the residual horizontal offset of the detector is proposed, and 1D point spread function is used to assess the performance of geometric calibration quantitatively. …”
    Get full text
    Article
  16. 2296

    Revealing Spatiotemporal Urban Activity Patterns: A Machine Learning Study Using Google Popular Times by Mikel Barrena-Herrán, Itziar Modrego-Monforte, Olatz Grijalba

    Published 2025-06-01
    “…As a result, this research assesses the utility of this data source for evaluating the changing dynamics of a city across both space and time. …”
    Get full text
    Article
  17. 2297

    Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences by Christoph Lange, Andreas Ahrens, Yadu Krishnan Krishnakumar, Olaf Grote

    Published 2025-06-01
    “…The focus of the current work is on detecting deviations from the ideal gap-density function describing randomized bit sequences. For testing and verification purposes, the well-researched post-quantum cryptographic CRYSTALS suite, including its Kyber and Dilithium schemes, is utilized. …”
    Get full text
    Article
  18. 2298

    Optimizing the Production of LNG and NGL from Arab Crudes and Wet Gases by Adel M. Hemeida, Mohammed S. Al-Blehed, Saad El-Din Desouky

    Published 1995-01-01
    “…The objective function of the model is to maximize the net cash flow return of selling LNG and NGL. …”
    Get full text
    Article
  19. 2299

    Powering Implanted Devices Wirelessly Using Spider-Web Coil by Amal Ibrahim Mahmood, Sadik Kamel Gharghan, Mohamed A.A. Eldosoky, Ahmed M. Soliman

    Published 2023-12-01
    “…The wireless power transfer (WPT) technique, specifically magnetic resonator coupling (MRC), was utilized to address the limited battery capacity of IBMs. …”
    Get full text
    Article
  20. 2300

    Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm. by Zongjin Li, Liqin Tian, Libing Bai, Zeyu Jia, Xiaoming Wu, Changxin Song

    Published 2025-01-01
    “…We propose a novel deep graph clustering feature selection (DeepGCFS) algorithm to identify hypertension gene biomarkers with more biological significance. This algorithm utilizes a graph network to represent the interaction information between genes, builds a GNN model, designs a loss function based on link prediction and self-supervised learning ideas for training, and allows each gene node to obtain a feature vector representing global information. …”
    Get full text
    Article