Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
27621
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01“…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
Get full text
Article -
27622
Urban Landscape Design Based on Virtual Reality Technology
Published 2022-01-01“…It can help designers to better perfect the design details, experience it personally in the design process, find the existing problems and defects in the current design in time, and improve the design efficiency. …”
Get full text
Article -
27623
Patient and clinician perceptions of telehealth in musculoskeletal physiotherapy services - A systematic review of the evidence-base.
Published 2025-03-01“…This critical review aims to understand patient and clinician views of telehealth adoption regarding effectiveness and satisfaction within musculoskeletal (MSK) physiotherapy services. A systematic process was used to search for evidence within 6 databases (CINAHL, PyscINFO, Medline, AMED, EMCARE, EMBASE) utilising clear inclusion and exclusion criteria in August 2024. …”
Get full text
Article -
27624
How cells wrap around coronavirus-like particles using extracellular filamentous protein structures
Published 2025-04-01“…Nanoparticles, such as viruses, can enter cells via endocytosis, a process by which the cell membrane wraps around them. …”
Get full text
Article -
27625
INFORMATION TERRORISM
Published 2018-12-01“…The information that reaches the individual is received and processed by him from his own perspective. The spreading of information is done through the Internet that creates unlimited email communication by means of the personal internet page, blog, vlog or Twitter through social networks such as Facebook, Instagram or LinkedIn. …”
Get full text
Article -
27626
Binding of transmissible gastroenteritis virus and porcine respiratory coronavirus to human and porcine aminopeptidase N receptors as an indicator of cross-species transmission.
Published 2025-01-01“…A critical factor in this process is the interaction between coronavirus spike proteins and host cell surface receptors, which plays an important role in infection and disease progression. …”
Get full text
Article -
27627
Synthesis of program angular motions of the Earth remote sensing spacecraft with high spatial resolution
Published 2021-06-01“…The article considers a spacecraft for remote sensing of the Earth with high-resolution or ultra-high-resolution optical-electronic equipment. During the shooting process, the recorded image constantly moves through the photodetector matrix at a non-constant and/or excessive velocity, which is not suitable for this photodetector. …”
Get full text
Article -
27628
Reference-Free Assessment of Speech Intelligibility Using Bispectrum of an Auditory Neurogram.
Published 2016-01-01“…This metric could be applied to evaluate the performance of various speech-processing algorithms designed for hearing aids and cochlear implants.…”
Get full text
Article -
27629
Navigation strategies in Caenorhabditis elegans are differentially altered by learning.
Published 2025-03-01“…Together, we present a flexible navigation algorithm that is supported by distributed neural computation in a compact brain.…”
Get full text
Article -
27630
Stock Price Predictions with LSTM-ARIMA Hybrid Model under Neutrosophic Treesoft sets with MCDM interaction
Published 2025-04-01“…The Analytic Hierarchy Process (AHP) is used to assign weights to various financial factors. …”
Get full text
Article -
27631
Analysis of Magnetohydrodynamic Micropolar Nanofluid Flow due to Radially Stretchable Rotating Disk Employing Spectral Method
Published 2023-01-01“…The obtained results confirm that SLLM is a stable, accurate, convergent, and computationally very efficient method to solve a large coupled system of equations. …”
Get full text
Article -
27632
Evaluation of Luteolin Nanosuspensions on Pharmacokinetics of Atorvastatin: Drug-Drug Interactions Using Rat Models
Published 2025-02-01“…We confirmed these results in rats, and the computer models also supported the findings.This study offers evidence that when LUT is combined with ATV, LUT increases the amount of ATV in the bloodstream, and a promising strategy by computer predictions for humans is that the dosage of ATV need to be adjusted to avoid potential side effects. …”
Get full text
Article -
27633
New Mathematical Modeling to Optimize the Frequency of Bus Routes
Published 2025-01-01Get full text
Article -
27634
Spectral Pattern Classification in Lidar Data for Rock Identification in Outcrops
Published 2014-01-01Get full text
Article -
27635
AllianceBlockchain in the Governance Innovation of Internet Hospitals
Published 2024-12-01Get full text
Article -
27636
A survey of intrusion detection on industrial control systems
Published 2018-08-01Get full text
Article -
27637
A literature review on V2X communications security: Foundation, solutions, status, and future
Published 2024-12-01Get full text
Article -
27638
Research on Construction and Practice of Precision Teaching Classroom for University Programming Courses
Published 2023-01-01Get full text
Article -
27639
Improved marine predators algorithm for engineering design optimization problems
Published 2024-06-01Get full text
Article -
27640
Kernel Ridge-Type Shrinkage Estimators in Partially Linear Regression Models with Correlated Errors
Published 2025-06-01Get full text
Article