-
2481
Mined Block Withholding and Imposed Fork by Using Mining Pool Alliance Strategic—A Case Study in Bitcoin System
Published 2025-01-01“…We developed algorithms to conduct simulation solutions based on the consensus mechanism of the Bitcoin operation, except for the hash function execution. The calculation results are replaced with two types of balls that represent hash values that satisfy the threshold of the mined block. …”
Get full text
Article -
2482
Deep Reinforcement Learning in Non-Markov Market-Making
Published 2025-02-01“…Next, we discuss the training and testing results, where we provide visuals of how important deterministic and stochastic processes such as the bid/ask prices, trade executions, inventory, and the reward function evolved. …”
Get full text
Article -
2483
A Coordinated Pumped Storage Dual Compensated Hydro Governor with PSS Action to Damp Electromechanical Power Oscillations
Published 2022-01-01“…Again, subject to critical oscillatory unstable conditions, the DCG is coordinated with PSS through a multiobjective function employing a new modified Differential Evolutionary-Particle swarm optimization (MDEPSO) algorithm. …”
Get full text
Article -
2484
Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures
Published 2018-04-01“…After a detailed study, it is shown that the traffic duel configuration does not affect the grid with cut-through nodes if the workload is increases to the peak load, at which the grid comes to a complete deadlock. The execution intensity of guns which generate a malicious traffic is determined by a random function with the Poisson distribution. …”
Get full text
Article -
2485
Potential guidelines for cataract surgery and rehabilitation in visually impaired patients: Literature analysis
Published 2024-12-01“…Patients with visual impairments rely on retinal regions with the greatest residual function, and cataract surgery aims to enhance focus on these areas, improving reading quality and reducing scotoma perception. …”
Get full text
Article -
2486
Cooperative UAV clustering for fair coverage of communication regions
Published 2025-03-01“…Our solution is a centralized training distributed execution architecture and defines a cluster structure for leader UAVs and follower UAVs. …”
Get full text
Article -
2487
Exploring Fintech, financial literacy, and stock market participants nexus in Dar es Salaam Stock Exchange, Tanzania
Published 2025-08-01“…Furthermore, the study emphasizes the essential function of financial literacy, suggesting that elevated levels of financial knowledge are positively correlated with an increase in stock market participation. …”
Get full text
Article -
2488
AUDIT COMMITTEE’S ATTRIBUTES AND QUALITY OF FINANCIAL REPORTING ON LISTED CONSUMER GOODS FIRMS IN NIGERIA
Published 2024-10-01“…To maintain an effective oversight function and foster a positive environment for the legally required audit that promotes a reliable and unbiased perspective of the financial information, this study proposed that the governing board of executives guarantee the nomination of appropriate audit committee members who have adequate financial skills, including shareholders. …”
Get full text
Article -
2489
Ensuring the integrity of information in an autonomous group of unmanned aerial vehicles by methods of modular arithmetic
Published 2022-09-01“…When performing special tasks autonomous group drones form a spatially distributed and scalable data processing system with unpredictable and dynamically changeable structure in which the execution of the main "target" function to process information depends on the communication environment. …”
Get full text
Article -
2490
The effect of the strategy to nominate ideas on divided and selective attention and perform some volleyball skills
Published 2025-02-01“… Introduction: Attention is a fundamental cognitive function in sports, particularly in volleyball, where players must process multiple stimuli and make rapid decisions. …”
Get full text
Article -
2491
Optimal Computation Offloading Decisions Based on System Utility and Cost Balance
Published 2025-01-01“…Based on the new evaluation model, an objective function is constructed to minimize the system’s cost-utility ratio, and an improved particle swarm optimization algorithm with enhanced search capabilities is proposed to solve it by designing a computation offloading strategy. …”
Get full text
Article -
2492
Exploring the Future Energy Value of Long-Duration Energy Storage
Published 2025-03-01“…Long-duration storage value and deployment potential are a function of evolving electricity sector infrastructure, markets, and policy, making it critical to consistently revisit potential long-duration storage contributions to the grid.…”
Get full text
Article -
2493
A new method of task aggregation and optimization allocation for multiple groups collaborative task networks
Published 2025-07-01“…The clustering cost function for tasks is constructed by analyzing the similarity between formation force locations and resource requirements, and between sub-task locations and resource requirements. …”
Get full text
Article -
2494
Left Bronchial Sleeve Resection for Metastatic Typical Carcinoid: A Case Report and Literature Review
Published 2025-01-01“…The successful outcome underscores the importance of meticulous surgical planning and execution in achieving favorable results in complex thoracic surgeries.…”
Get full text
Article -
2495
Design of a personalized oral‒motor exercise device for speech impairment rehabilitation
Published 2025-03-01“…Current devices used for rehabilitation often fail to accurately assess exercise execution, which limits their effectiveness.Methods: This study introduces a novel oral-motor rehabilitation device designed to overcome these limitations. …”
Get full text
Article -
2496
Exploring Image Decolorization: Methods, Implementations, and Performance Assessment
Published 2024-12-01“…This paper discusses the decolorization process and provides an overview of the methods based on the different principles used: basic conversion from RGB to YUV format using ITU Recommendations 601, 709, and 2020; basic conversion from RGB to LAB color space; the method using cumulative distribution function of color channels; one global decolorization method; and one based on deep learning. …”
Get full text
Article -
2497
A UAV path planning algorithm for bridge construction safety inspection in complex terrain
Published 2025-04-01“…Thereby, UAVs are empowered to execute path-planning endeavors expeditiously and precisely within intricate environments.…”
Get full text
Article -
2498
ANALYSIS OF MEDICAL SERVICE CONTROL PROCESS IN THE SCOPE OF COMPULSORY HEALTH INSURANCE PROGRAM
Published 2015-06-01“…In respect that human factor influence on the main stages of the analyzed process, we propose to use fuzzy logic as an inference engine. The self-learning function of the system will provide case-based reasoning.…”
Get full text
Article -
2499
A recurrent multimodal sparse transformer framework for gastrointestinal disease classification
Published 2025-07-01“…Classification is performed using an ensemble of random forest KNN, proximal policy optimization (PPO), and a sparse radial basis function (RBF) kernel to ensure accuracy and interpretability. …”
Get full text
Article -
2500
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article