Suggested Topics within your search.
Suggested Topics within your search.
-
4641
Remote Sensing Target Tracking Method Based on Super-Resolution Reconstruction and Hybrid Networks
Published 2025-01-01“…Remote sensing images have the characteristics of high complexity, being easily distorted, and having large-scale variations. …”
Get full text
Article -
4642
SysML-based compositional verification and safety analysis for safety-critical cyber-physical systems
Published 2022-12-01“…With the increased acceptance of Model-Driven Development (MDD) in the safety-critical domain, the SysML language has been broadly used. Increasing complexity results in the formal verification of the SysML models of SC-CPS often faces the so-called state-explosion problem. …”
Get full text
Article -
4643
Hormone-producing Ovarian Tumors in Children. Literature Review
Published 2024-02-01“…Hormone-producing ovarian tumors in girls are an actual problem in modern gynecology, which is associated with certain difficulties in managing patients. …”
Get full text
Article -
4644
Cross-Method Overview of Fleet-Based Machine Health Estimation and Prediction: A Practical Guide for Industrial Applications
Published 2025-01-01“…To this end, data-driven approaches have gained prominence owing to the advancements in data acquisition and machine learning techniques. …”
Get full text
Article -
4645
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
4646
Development of model for human factor influence assessment on construction and road machines operation efficiency
Published 2020-08-01“…The human factor and the characteristics of construction and road machine operators, such as experience, work experience, professional skills, skill, etc., have a significant impact on the efficiency of equipment operation. …”
Get full text
Article -
4647
Two-Phase Optimization Models for Liner Shipping Network Based on Hub Ports Cooperation: From the Perspective of Supply-Side Reform in China
Published 2021-01-01“…The models in both phases are mixed-integer linear programming (MILP), but are solved by different tools: CPLEX for the NA phase models and the Genetic Algorithm (GA) for the NO phase models due to the computational complexity of the latter problem. Then, a computational experiment is performed on the LSN of COSCO Shipping on the Persian Gulf trade lane. …”
Get full text
Article -
4648
Filtration Bypassing Retaining Hydraulic Structures
Published 2020-06-01“…Calculation of filtration bypassing the coastal abutment at specified water levels in the upper and lower pools is performed with the aim of constructing an encircling curve of depression and determining a gradient of filtration flow that controls the filtration strength of the soil beyond the abutment. This problem has no theoretical solutions – in view of its complexity, approximate calculation methods have been developed for individual calculation schemes. …”
Get full text
Article -
4649
From Thermal City to Well-Being Landscape: A Proposal for the UNESCO Heritage Site of Pineta Park in Montecatini Terme
Published 2025-03-01“…This article, instead, argues that a landscape-based approach is essential for understanding the complexity of the problem and for providing sustainable solutions. …”
Get full text
Article -
4650
Variations in Lorica Morphology and Element Composition in the Euglenoid Trachelomonas hispida var. coronata Under the Influence of Fe and Mn Supply
Published 2025-01-01“…Our research also shows that a broad discussion of the problem should be undertaken, and modern methods must be developed to unravel the complexities not only within the species but also within the entire Trachelomonas.…”
Get full text
Article -
4651
SLACPSS: Secure Lightweight Authentication for Cyber–Physical–Social Systems
Published 2024-09-01“…This shift from CPSs to CPSSs is primarily due to the widespread use of sensor-equipped smart devices that are closely connected to users. CPSSs have been a topic of interest for more than ten years, gaining increasing attention in recent years. …”
Get full text
Article -
4652
Evaluating English Oral Production in University Students through Google Meet Using Neutrosophic Z-Numbers
Published 2025-05-01“…However, previous studies on platforms such as Google Meet have tended to privilege traditional quantitative approaches, leaving aside the complexity of students' subjective perceptions. …”
Get full text
Article -
4653
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
4654
An introduction to the unitary patent system
Published 2025-06-01“…Based on the classic European patent system, this new system has been designed with the objective of resolving the fragmentation that occurs in the post-grant phase, reducing costs and complexity for users. Furthermore, the creation of the Unified Patent Court provides a solution to the litigation system, offering a cost-effective option for users of the patent system seeking patent protection and dispute settlement across Europe.The unitary effect is feasible for all Member States that are engaged in enhanced cooperation and for which the Agreement on a Unified Patent Court (UPCA) has been ratified on the date of registration of the unitary effect.On September 1, 2024, Romania became the eighteenth member state of the European Union to adopt the Unitary Patent System, having ratified the UCPA. …”
Get full text
Article -
4655
The robustness of popular multiclass machine learning models against poisoning attacks: Lessons and insights
Published 2022-07-01“…Data set poisoning is a severe problem that may lead to the corruption of machine learning models. …”
Get full text
Article -
4656
Economic Method for Energy Storage Planning of Large New Energy Bases in the Electricity Spot Market
Published 2025-03-01“…The upper layer focuses on the optimal scheduling model of the new energy base with the objective of maximizing its revenue. Given the complexity of the two-layer model, an alternating iteration method is employed to solve the problem. …”
Get full text
Article -
4657
A new e-commerce model for free-riding behavior in decentralized supply chains
Published 2025-05-01“… The complexity of consumer free-riding behavior is a current significant problem, as modern online purchasing channels sharply compete with the traditional ones. …”
Get full text
Article -
4658
Performance Evaluation of Uplink Cell-Free Massive MIMO Network Under Weichselberger Rician Fading Channel
Published 2025-07-01“…However, estimating the channel with high-performance, low-cost computational methods is still a problem. Different algorithms have been developed to address these challenges in channel estimation. …”
Get full text
Article -
4659
Comprehensive analysis of poly(A) tails in mouse testes and ovaries using Nanopore Direct RNA Sequencing
Published 2025-01-01“…Moreover, gametogenesis, especially oogenesis, represents a unique instance of the complexity of poly(A) tails metabolism, with oocyte-specific waves of cytoplasmic polyadenylation. …”
Get full text
Article -
4660
Designing a causal model of factors affecting the Lars supply chain
Published 2024-09-01“…Also, other objectives such as environmental impacts, including carbon dioxide emissions and energy consumption, and social welfare have been added to the literature to consider the sustainability problem more comprehensively (Kadambala, Subramanian, Tiwari, Abdulrahman, & Liu, 2017). …”
Get full text
Article