-
6061
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
6062
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Compared with the existing schemes without suffering from key escrow, the scheme is the most efficient scheme and the signing algorithm needs only one scalar multiplication in the additive group while the reverse operation requires only three scalar multiplications.…”
Get full text
Article -
6063
Treatment of Subcorneal Pustular Dermatosis without Dapsone: A Case Report and Review of the Literature
Published 2024-01-01“…Subcorneal pustular dermatosis (SPD) is a rare neutrophilic dermatosis characterized by pustules on the trunk and intertriginous areas. While oral dapsone is the first-line treatment for SPD, alternative options are necessary for patients with glucose-6-phosphate dehydrogenase deficiency, drug hypersensitivity reactions, or refractory disease. …”
Get full text
Article -
6064
Dynamic Modeling and Composite Attitude Cooperative Control for Dumbbell-Shaped Spacecraft
Published 2025-01-01“…First, a dynamic model is formulated that accounts for actuator faults and external disturbances while enabling distributed attitude coordination control. …”
Get full text
Article -
6065
Multiuser computation offloading for edge-cloud collaboration using submodular optimization
Published 2020-10-01“…A computation offloading scheme based on edge-cloud computing was proposed to improve the system utility of multiuser computation offloading.This scheme improved the system utility while considering the optimization of edge-cloud resources.In order to tackle the problems of computation offloading mode selection and edge-cloud resource allocation,a greedy algorithm based on submodular theory was developed by fully exploiting the computing and communication resources of cloud and edge.The simulation results demonstrate that the proposed scheme effectively reduces the delay and energy consumption of computing tasks.Additionally,when computing tasks are offloaded to edge and cloud from devices,the proposed scheme still maintains stable system utilities under ultra-limited resources.…”
Get full text
Article -
6066
Pattern mining and prediction techniques for user behavioral trajectories in e-commerce.
Published 2025-01-01“…Second, it introduces a frequent sub-trajectory mining algorithm that emphasizes the order of user visits for trajectory analysis and prediction. …”
Get full text
Article -
6067
Lightweight YOLOv8s-Based Strawberry Plug Seedling Grading Detection and Localization via Channel Pruning
Published 2024-11-01“…Furthermore, a two-stage seedling-hole matching algorithm was introduced based on the pruned YOLOv8s model. …”
Get full text
Article -
6068
A Review of Numerical Techniques for Frictional Contact Analysis
Published 2025-01-01“…The choice of contact algorithm significantly impacts accuracy and efficiency; penalty methods, though computationally efficient, can lack accuracy at high friction coefficients; whereas, Lagrange multiplier methods, while more accurate, are computationally more demanding. …”
Get full text
Article -
6069
Feature fusion with attributed deepwalk for protein–protein interaction prediction
Published 2025-04-01“…Abstract protein–protein interactions (PPIs) are crucial for understanding cellular processes and disease mechanisms. While experimental methods for detecting PPIs exist, computational approaches offer a more efficient alternative. …”
Get full text
Article -
6070
SHAPING THE STOCK PORTFOLIO BY THE INVESTMENT RATING METHOD
Published 2018-02-01“…For the last five years capitalization of joint stock companies in Russia nearly doubled while the major indicator of stock market development, i. e. …”
Get full text
Article -
6071
PV<i>k</i>NN: A Publicly Verifiable and Privacy-Preserving Exact <i>k</i>NN Query Scheme for Cloud-Based Location Services
Published 2025-06-01“…The <i>k</i>-nearest- neighbor (<i>k</i>NN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. …”
Get full text
Article -
6072
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
Get full text
Article -
6073
Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control
Published 2025-04-01“…This research presents the SmartIoT Hybrid Machine Learning (ML) Model, a novel integration of Attribute-Based Authentication and a lightweight machine learning algorithm designed to enhance security while minimising computational overhead. …”
Get full text
Article -
6074
DRACO: Decentralized Asynchronous Federated Learning Over Row-Stochastic Wireless Networks
Published 2025-01-01“…Our approach leverages continuous communication, allowing edge devices to perform local training and exchange model updates along a continuous timeline, thereby eliminating the need for synchronized timing. Additionally, our algorithm decouples communication and computation schedules, enabling complete autonomy for all users while effectively addressing straggler issues. …”
Get full text
Article -
6075
Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks
Published 2025-07-01“…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
Get full text
Article -
6076
Optimizing the train timetable in a high-speed rail corridor: The implications on departure time, fare cost and seat preference of passengers.
Published 2025-01-01“…Using the Lanzhou-Xi'an high-speed railway corridor as a case study, we apply a genetic algorithm combined with a nested Frank-Wolfe method to solve the model. …”
Get full text
Article -
6077
Low-Power Portable System for Power Grid Foreign Object Detection Based on the Lightweight Model of Improved YOLOv7
Published 2025-01-01“…Foreign objects caught and entangled on power grid transmission lines, power towers and other equipment can pose potential threats to the power system. The detection algorithm for foreign objects in the power grid cannot achieve the optimal balance in terms of accuracy and efficiency. …”
Get full text
Article -
6078
External phantom-based validation of a deep-learning network trained for upscaling of digital low count PET data
Published 2025-04-01“…Conclusions Phantom-based validation of AI-based algorithms allows for a detailed assessment of the performance, limitations, and generalizability of deep-learning based algorithms for PET image enhancement. …”
Get full text
Article -
6079
Dual-coding Contrastive Learning Based on the ConvNeXt and ViT Models for Morphological Classification of Galaxies in COSMOS-Web
Published 2025-01-01“…Using the GoogLeNet algorithm, we classify the morphology of the remaining 27% of galaxies. …”
Get full text
Article -
6080
Genotyping Identification of Maize Based on Three-Dimensional Structural Phenotyping and Gaussian Fuzzy Clustering
Published 2025-01-01“…By leveraging the 3D reconstruction algorithm SFM (Structure from Motion), we promptly obtained point clouds of the maize tassels. …”
Get full text
Article