Suggested Topics within your search.
Suggested Topics within your search.
-
1441
Priority Development Subject Areas of Global Medical Science
Published 2023-11-01“…The data obtained during the study confirm the strong thematic correlation between publications in certain subject areas. The algorithm described in the paper can be further adopted on local, organizational, regional, and national levels, i. e. in organizations, cities, and countries. …”
Get full text
Article -
1442
-
1443
Well logging super-resolution based on fractal interpolation enhanced by BiLSTM-AMPSO
Published 2025-05-01Get full text
Article -
1444
-
1445
Implementing E-MOTIVE for detection and treatment of postpartum haemorrhage in South Africa
Published 2023-12-01“…E-MOTIVE was integrated into the existing Essential Steps in Managing Obstetric Emergencies algorithm. Certain research-related elements of the trial setting cannot be replicated in routine practice. …”
Get full text
Article -
1446
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
1447
Boundary delineation and stability assessment of post-inrush water-immersed coal pillars based on integrated microseismic monitoring and field analysis
Published 2025-07-01“…Abstract The stability of flooded coal pillars has long been a challenging issue in coal pillar research, especially during the recovery of production after water inrush disasters. …”
Get full text
Article -
1448
Extracting toponyms from OpenStreetMap and other gazetteers: comparing representational accuracy in multilingual contexts
Published 2025-06-01“…Abstract The goal of this paper is to investigate OpenStreetMap as a research tool by analysing what pros and cons this platform offers to linguistics and to GIS disciplines. …”
Get full text
Article -
1449
-
1450
Vulvar squamous cell carcinoma: The role of p53 and p16 immunohistochemistry
Published 2024-12-01Get full text
Article -
1451
Using the clustering method to find the final environmental parameters coefficients in road construction projects
Published 2025-02-01“…The above findings can be helpful for researchers in road construction projects.…”
Get full text
Article -
1452
-
1453
-
1454
Fractal cycles of sleep, a new aperiodic activity-based definition of sleep cycles
Published 2025-01-01Get full text
Article -
1455
Multiobjective Approach to the Transit Network Design Problem with Variable Demand considering Transit Equity
Published 2022-01-01“…In particular, the multiobjective Nondominated Sorting Genetic Algorithm-II and the neighborhood local search method are employed in a logit-based mode-choice model in order to incorporate the variable transit demand arising from the private vehicle traffic volume. …”
Get full text
Article -
1456
Analysis of closed and open numerical systems of geochemical data in spatial statistics environment in order to separate anomalous areas
Published 2025-07-01“…This method models the geochemical open or log-transformed data by the U-spatial statistics algorithm and has been used for the first time in this paper. …”
Get full text
Article -
1457
A Low-Cost pH Sensor for Real-Time Monitoring of Aquaculture Systems in a Multi-Layer Wireless Sensor Network
Published 2025-04-01“…The available pH sensors using chemical references are not suitable for continuous in situ monitoring of aquaculture systems due to their frequent calibration requirement and high cost. This research develops a pH sensor with temperature compensation implementing a machine learning (ML) algorithm. …”
Get full text
Article -
1458
APPLICATION OF DBSCAN FOR CLUSTERING SOCIETY BASED ON WASTE MANAGEMENT BEHAVIOR
Published 2025-04-01“…As a solution, the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm is applied, which allows the clustering of objects based on local density and detects the presence of noise or outliers in the data. …”
Get full text
Article -
1459
-
1460
Evaluation of Lightning Prediction by an Electrification and Discharge Model in Long-Term Forecasting Experiments
Published 2022-01-01“…Over nearly three rainy seasons of lightning activity in North China, numerical prediction experiments were carried out using the Weather Research and Forecasting model coupled with electrification and discharge schemes (WRF-Electric). …”
Get full text
Article