Suggested Topics within your search.
Suggested Topics within your search.
- Economic conditions 2
- Economic policy 2
- English 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- Animal behavior 1
- Architecture 1
- Calculus 1
- Civil engineering 1
- Civilization 1
- Directed graphs 1
- Disinformation 1
- Economic assistance 1
- Economic development 1
- Educational leadership 1
- English language 1
- Evaluation 1
- Fake news 1
- Foreign economic relations 1
- French 1
- French language 1
- History 1
- Human factors 1
- Human reproduction 1
- Human resource management 1
- Income distribution 1
- International Business Enterprises 1
- International business enterprises 1
- Internationalisatie 1
-
2661
Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice
Published 2023-01-01“…In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary decision diagram.Firstly, two different institutions were constructed to jointly generate the user’s secret key, which reduced the risk of key disclosure by institutions.Secondly, the user’s specific information was embedded in each secret key to realize the traceability of the key, and the access of illegal users and malicious users were avoided by maintaining the white list.In addition, the access structure of ordered binary decision diagram was adopted by the proposed scheme, and the positive and negative values of attributes on the basis of supporting attribute AND, OR and Threshold operation were increased.Analysis shows that the proposed scheme meets the distinguishable security of anti-collusion attack and chosen-plaintext attack, reduces the storage and computing overhead, and it is more practical than other schemes.…”
Get full text
Article -
2662
Small neutrino masses from a decoupled singlet scalar field
Published 2025-02-01“…After the Z4 symmetry is broken to Z2 by the VEV of the spurion, much below the mass scale of the dark singlet scalar, a small lepton number violating coupling for the inert doublet is generated at tree level, so small neutrino masses are obtained at one-loops for relatively light new fields. …”
Get full text
Article -
2663
-
2664
The traces of roman metallurgy in Eastern Serbia
Published 2009-01-01“…Roman mining-metallurgical activities in eastern Serbia flourished from the end of the 3rd century, were interrupted by the invasion of Huns in AD 441. and restored in the time of emperors Anastasius and Justin I, in the end of the 5th - beginning of the 6th centuries. …”
Get full text
Article -
2665
The effect of random scale changes on limits of infinitesimal systems
Published 1978-01-01Get full text
Article -
2666
Rapid Diagnosis of Intestinal Parasitic Protozoa, with a Focus on Entamoeba histolytica
Published 2009-01-01“…Circulating Gal/GalNac lectin antigens can be detected in the serum of patients with untreated amoebic liver abscess. …”
Get full text
Article -
2667
Trans-signifiance : signes efficaces et pouvoir du discours
Published 2025-02-01“…À partir de là, nous proposons de relier cette réflexion à la théorie des speech acts proposée par John Austin et intégrée à la théorie de l’énonciation d’Émile Benveniste, ce qui nous permettra de réarticuler le problème en termes d’efficacité sémiotique.…”
Get full text
Article -
2668
Circuit Distortion Analysis Based on the Simplified Newton's Method
Published 2011-01-01Get full text
Article -
2669
Studying Same-Sign Top Pair Production through Top-Higgs FCNC Interactions at the HL-LHC
Published 2022-01-01“…A relatively smaller background contribution and clean signature are the advantages of the leptonic decay mode of the same-sign W bosons in the same-sign production processes of top quark pairs. …”
Get full text
Article -
2670
Simulation Study on Clustering Approaches for Short-Term Electricity Forecasting
Published 2018-01-01“…The contributions of this paper are threefold: (1) using data from 46 homes in Austin, Texas, the similarity measures from different time series are analyzed; (2) the optimal number of clusters for representing residential electricity use profiles is determined; and (3) an extensive load forecasting study using different segmentation-enhanced forecasting algorithms is undertaken. …”
Get full text
Article -
2671
Transformative effects of ChatGPT on modern education: Emerging Era of AI Chatbots
Published 2024-01-01Get full text
Article -
2672
-
2673
Development a glycosylated extracellular vesicle-derived miRNA Signature for early detection of esophageal squamous cell carcinoma
Published 2025-01-01“…Fucosylated (Fuc-) and sialylated (Sia-) EVs were isolated utilizing Lentil lectin (LCA) and wheat germ lectin (WGA)-coated magnetic beads, respectively. …”
Get full text
Article -
2674
-
2675
The Older Gamer in Games Studies: Marginalised or Idealised?
Published 2020-12-01Get full text
Article -
2676
Neutrinoless Double Beta Decay: 2015 Review
Published 2016-01-01“…In particular, we contextualize the 0νββ in the panorama of lepton number violating processes, also assessing some possible particle physics mechanisms mediating the process. …”
Get full text
Article -
2677
-
2678
PD-L1 knockout or ZG16 overexpression inhibits PDAC progression and modulates TAM polarization
Published 2025-01-01“…CRISPR/Cas9-mediated genome editing has the potential to delete PD-L1 both on the cell surface and inside the cell, thereby inhibiting tumor growth and migration and overcoming immunosuppression. ZG16, with its lectin structure, can reduce PD-L1 expression on the cell surface. …”
Get full text
Article -
2679
-
2680
Prospects of measuring quantum entanglement in ττ final states at a future e+e− Higgs factory
Published 2024-01-01“…This discussion will focus on the influence of pT trigger cuts on the visible π± in the τ lepton decay.…”
Get full text
Article