-
2281
In-Loop Adaptive Filters to Improve the Power Quality of Switched Reluctance Generator in WECS
Published 2022-01-01“…The notch cascading and moving average filters are implemented at the voltage loop of the voltage source converter in an adaptive form, as function of the SRG speed. …”
Get full text
Article -
2282
Hamstring vs Peroneus Longus Tendon Autograft in Anterior Cruciate Ligament Reconstruction: A Comparative Study
Published 2024-06-01“…Conclusion: With regard to its strength, larger graft diameter, satisfactory ankle function, and prevention of potential complications of HT autograft obtained from the knee region, the current study demonstrated that PLT autograft might be considered a safe and practical autograft source for arthroscopic ACLR.…”
Get full text
Article -
2283
A model for shale gas well production prediction based on improved artificial neural network
Published 2023-08-01Get full text
Article -
2284
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks
Published 2016-05-01“…If the critical masses of nodes do not cooperate in the network, the network would not be able to operate to achieve its functional requirements. To resolve the problem above, we introduce a Win-Stay, Lose-Likely-Shift (WSLLS) approach into a Prisoner's Dilemma (PD) game framework, and it applies a utility-based function, which is a linear combination of one player's payoff and its neighbors' in a game, to evaluate a player's (i.e., node) performance for a game. …”
Get full text
Article -
2285
Target pursuit for multi-AUV system: zero-sum stochastic game with WoLF-PHC assisted
Published 2025-03-01Get full text
Article -
2286
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
Published 2024-12-01“…This implementation has shown that our protocol is not only secure but also utilizes minimal resource consumption, making it particularly suitable for resource constrained RFID tags.…”
Get full text
Article -
2287
Artificial intelligence analysis in cyber domain: A review
Published 2022-04-01“…This method permits for the allocation of multiple log source types through a sliding time window and provides a scalable solution, which is a much-needed function.…”
Get full text
Article -
2288
Productivity evaluation of multi-stage fracturing horizontal wells in shale gas reservoir with complex artificial fracture occurrence
Published 2023-08-01“…This model serves as the foundation for establishing a gas reservoir-fracture-wellbore coupled seepage model, utilizing real space source function theory and pressure drawdown superposition principle. …”
Get full text
Article -
2289
Using Bayesian Population Viability Analysis to Define Relevant Conservation Objectives.
Published 2015-01-01“…We demonstrate one way to incorporate the BMPVA results into a utility function that balances the trade-offs between ecological and financial objectives, which can be used in an adaptive management framework to make optimal, transparent decisions. …”
Get full text
Article -
2290
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2291
Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA
Published 2025-07-01Get full text
Article -
2292
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
Published 2023-12-01“…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
Get full text
Article -
2293
Analisis Kontribusi Sektor Perhubungan terhadap Pendapatan Asli Daerah di Kabupaten Aceh Tengah
Published 2018-07-01“…The function of regional autonomy is to regulate and manage government affairs in the region, the implementation of regional autonomy has an important influence for each region to be more creative in utilizing existing economic resources in the region for the successful implementation of development in the region. …”
Get full text
Article -
2294
Insights into the diversity and conservation of the chB6 alloantigen
Published 2025-02-01“…The lack of homology within the intracellular domain remains puzzling. Utilizing genomic resources, we have found a number of similar molecules in both birds and reptiles; however, they show greater conservation in the intracellular domain, including an SH3 motif that we have shown to be critical in inducing apoptosis.…”
Get full text
Article -
2295
Cone Beam Micro-CT System for Small Animal Imaging and Performance Evaluation
Published 2009-01-01“…In order to reconstruct images with high spatial resolution and low artifacts, raw data preprocessing and geometry calibration are implemented before reconstruction. A method which utilizes a wire phantom to estimate the residual horizontal offset of the detector is proposed, and 1D point spread function is used to assess the performance of geometric calibration quantitatively. …”
Get full text
Article -
2296
Revealing Spatiotemporal Urban Activity Patterns: A Machine Learning Study Using Google Popular Times
Published 2025-06-01“…As a result, this research assesses the utility of this data source for evaluating the changing dynamics of a city across both space and time. …”
Get full text
Article -
2297
Length–Weight Distribution of Non-Zero Elements in Randomized Bit Sequences
Published 2025-06-01“…The focus of the current work is on detecting deviations from the ideal gap-density function describing randomized bit sequences. For testing and verification purposes, the well-researched post-quantum cryptographic CRYSTALS suite, including its Kyber and Dilithium schemes, is utilized. …”
Get full text
Article -
2298
Optimizing the Production of LNG and NGL from Arab Crudes and Wet Gases
Published 1995-01-01“…The objective function of the model is to maximize the net cash flow return of selling LNG and NGL. …”
Get full text
Article -
2299
Powering Implanted Devices Wirelessly Using Spider-Web Coil
Published 2023-12-01“…The wireless power transfer (WPT) technique, specifically magnetic resonator coupling (MRC), was utilized to address the limited battery capacity of IBMs. …”
Get full text
Article -
2300
Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm.
Published 2025-01-01“…We propose a novel deep graph clustering feature selection (DeepGCFS) algorithm to identify hypertension gene biomarkers with more biological significance. This algorithm utilizes a graph network to represent the interaction information between genes, builds a GNN model, designs a loss function based on link prediction and self-supervised learning ideas for training, and allows each gene node to obtain a feature vector representing global information. …”
Get full text
Article