-
81
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
Published 2025-04-01“…Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. …”
Get full text
Article -
82
Hardware implementation of RSA encryption algorithm based on pipeline
Published 2024-01-01“…To address the high cost of implementing long-bits RSA encryption algorithms in hardware, improvements have been made to the traditional radix-4 Montgomery algorithm. …”
Get full text
Article -
83
THE ALGORITHM FOR THE TREATMENT OF PATIENTS WITH TREATMENT-RESISTANT HYPERTENSION AT THE OUTPATIENT STAGE
Published 2023-03-01Get full text
Article -
84
Multi-objective optimization of HESS control for optimal frequency regulation in a power system with RE penetration
Published 2024-12-01“…The findings indicate that the Independently Optimized Virtual Synchronous Generator HESS (IO VSG-HESS) achieves the best settling time post-contingency but offers the least improvement in frequency nadir with an average of 0.31 %. …”
Get full text
Article -
85
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Context The study proposes and evaluates a novel cybersecurity architecture for telehealth, resilient against future quantum computing cyber threats. By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
86
Neurodynamic robust adaptive UWB localization algorithm with NLOS mitigation
Published 2025-04-01Get full text
Article -
87
Advances in Digital Signature Algorithms: Performance, Security and Future Prospects
Published 2025-01-01“…The results show that while optimizations improve computational efficiency, challenges persist, especially with potential quantum threats that could undermine these algorithms' security. …”
Get full text
Article -
88
Extended Blahut–Arimoto Algorithm for Semantic Rate-Distortion Function
Published 2025-06-01Get full text
Article -
89
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01Get full text
Article -
90
Research on Control Method of Electron Accelerator Based on Simulink Simulation
Published 2025-01-01“…The fuzzy neural network PID algorithm improves these indicators more significantly, the stabilization time is reduced by 77.9%, the overshoot is reduced by 79.6%, and the post-disturbance recovery time is reduced by 87.1%. …”
Article -
91
-
92
Assessing and Reducing Energy Consumption of Grain Cleaning and Drying Equipment
Published 2019-12-01“…(Research purpose) To adapt the criteria and algorithm of energy-saving optimization of field technology to assess and improve the status of energy efficiency, reduce energy consumption and identify the maximum available energy saving potential of grain drying equipment during energy audit. …”
Get full text
Article -
93
IDE-SVM algorithm and it's usage in physical layer security method for IoT
Published 2024-10-01Get full text
Article -
94
Synthesis of an Algorithm for Classifying Underwater Objects on Based on the Analysis of their Noise Spectra
Published 2024-03-01“…The need to reduce the probability of false alarms in such systems actualizes the issues of developing an optimal algorithm for classifying underwater objects by their sonar field. …”
Get full text
Article -
95
-
96
Post-integration based point-line feature visual SLAM in low-texture environments
Published 2025-04-01Get full text
Article -
97
An Area-Time Efficient Hardware Architecture for ML-KEM Post-Quantum Cryptography Standard
Published 2025-01-01“…To facilitate the integration of the NIST-standardized post-quantum cryptographic (PQC) algorithm, Module Lattice-based Key Encapsulation Mechanism (ML-KEM), into quantum-resistant devices and cryptosystems, this study introduces an area-time efficient hardware implementation. …”
Get full text
Article -
98
Analyzing Post-fire Vegetation Dynamics with Ultra-high Resolution Remote Sensing Data
Published 2025-07-01“…This study highlights the potential of UAV-based multi-temporal monitoring for post-fire forest assessment. Future research should focus on improving tree segmentation of SfM-MVS point clouds in dense canopies, optimizing co-alignment under varying environmental conditions, and integrating additional point cloud classification methods to improve accuracy in areas with complex species distribution.…”
Get full text
Article -
99
Multi-Objective Intelligent Routing Algorithm for LEO Satellite Networks Based on DQN
Published 2025-03-01Get full text
Article -
100
Parsimonious and explainable machine learning for predicting mortality in patients post hip fracture surgery
Published 2025-07-01“…In this study, we developed machine learning (ML) algorithms to estimate 30-day mortality risk post-hip fracture surgery in the elderly using data from the National Surgical Quality Improvement Program (NSQIP 2012–2017, n = 62,492 patients). …”
Get full text
Article