-
1
Downgrading Data and Opening Up the Democratic Party
Published 2018-12-01“…Through the adoption of digital technologies and fetishization of data above all, it has centralized its strategies in the hands of an elite class of overconfident political experts and number-crunchers whose practices are characterized by the rapid platformization and professionalization of party processes. Placing these changes in the context of the party’s long history of control, this manifesto critiques these practices, particularly the use of predictive analytics and the inability to see volunteers beyond tools to gather and input data. …”
Get full text
Article -
2
Authenticated Multi-Party Quantum Private Set Intersection with Single Particles
Published 2025-06-01“…As an important branch of secure multi-party computation, privacy set intersection enables multiple parties to input their private sets and jointly compute the intersection of these sets without revealing any information other than the intersection itself. …”
Get full text
Article -
3
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01“…In this paper, we introduce a two-party quantum private comparison (QPC) protocol that employs single photons as quantum resources and utilizes rotational encryption to safeguard the privacy of the inputs. …”
Get full text
Article -
4
Deliberative Democracy and the Three Inputs of Governance: Expertise, Self-Interest, and Emotions
Published 2024-12-01“…We discuss and systematize nondeliberative and deliberative ways of considering these three inputs. The latter include: meaningful and contextualized representation of expertise; deliberative negotiation on parties’ self-interests; as well as emotional testimonies, storytelling, bridging rhetoric etc. …”
Get full text
Article -
5
Implementation features of the third-party DLL connection mechanism in the information system «Channel»
Published 2015-09-01“…The problem-solving technique for the of third-party libraries connection developers is the master program abstraction from the data used by the plugins, the unification of requirements to the external libraries, the supply of each library with a special description file, and the creation of the input parameter editing procedure for each library. …”
Get full text
Article -
6
Fuzzy Based Design for Third-Party Pipeline Failures in the Niger Delta Region of Nigeria
Published 2015-07-01“…A Fuzzy based design for assessing failures of pipelines occasioned by third party in the Niger Delta Region of Nigeria has been proposed in this study. …”
Get full text
Article -
7
Fuzzy Based Design for Third-Party Pipeline Failures in the Niger Delta Region of Nigeria
Published 2015-07-01“…A Fuzzy based design for assessing failures of pipelines occasioned by third party in the Niger Delta Region of Nigeria has been proposed in this study. …”
Get full text
Article -
8
A brain-inspired algorithm improves “cocktail party” listening for individuals with hearing loss
Published 2025-04-01“…The results provide compelling support for the potential benefits of biologically inspired algorithms for assisting individuals with hearing loss in “cocktail party” situations.…”
Get full text
Article -
9
Efficiency Evaluation and Performance Comparison of Third-Party Logistics Providers: AHP-DEA Approach
Published 2025-10-01“…DEA is a non-parametric method that measures the efficiency of 3PLs by examining multiple inputs and outputs variables while AHP is a hierarchy structured decision-making tool that employs pairwise comparisons for evaluating third-party logistics providers (3PLs). …”
Get full text
Article -
10
Integrating α-Discounting and Neutrosophic Decision Modeling in University Ideological and Political Education under Party-Building Leadership
Published 2025-07-01“…A detailed case study is included, simulating decision inputs from multiple university stakeholders, and fully worked with precise mathematical calculations and normalized outcomes. …”
Get full text
Article -
11
-
12
Three-Photon Pulse Interference in a Tritter: A Novel Approach for a Three-Party Quantum Key Distribution Protocol
Published 2025-04-01“…These distinctive interference patterns arise across a wide range of specific phase difference combinations among the input photons. We suggest that these unique interference characteristics provide new insights into the potential implementation of a three-party quantum key distribution protocol. …”
Get full text
Article -
13
Research on Pricing and Effort Investment Decisions for Dual-Channel Fresh Product Supply Chain Under the Participation of Third-Party Logistics Provider
Published 2025-07-01“…However, in scenarios where consumers are highly sensitive to freshness and marketing efforts, the system profit of the D2 Model is higher than that of the D1 Model. (3) The supply chain has lower pricing and effort input when consumers are more sensitive to prices and higher pricing and effort input when consumers are more sensitive to freshness. …”
Get full text
Article -
14
Cryptographic inference for large language model via secret sharing
Published 2025-06-01“…Inference services based on large language models may lead to the leakage of user input hints to the server or proprietary model weights to the user. …”
Get full text
Article -
15
Komparasi Determinan Pembiayaan Pada Bank Mandiri Dan Bank Syariah Mandiri
Published 2021-10-01“…This research can provide input for Islamic banking, especially Bank Mandiri and Bank Syariah Mandiri, in determining profit-sharing financing policies.…”
Get full text
Article -
16
ASSESSING GST COMPLIANCE FRAMEWORK: AN INVESTIGATION ON THE INFLUENCE OF ITC MISMATCH ON STAKEHOLDERS IN INDIA
Published 2025-02-01“…Still, the mismatch of the Input Tax Credit (ITC) has become a major concern for several parties. …”
Get full text
Article -
17
Analysis of energy flow and its intensity: A case study from China's 180 inter-provincial sectors
Published 2025-05-01Get full text
Article -
18
Multiparty Quantum Private Comparison Using Rotation Operations
Published 2025-04-01“…These encoded single-photon states undergo encryption via rotational operations, effectively obscuring the original inputs before transmission to a semi-honest third party (TP). …”
Get full text
Article -
19
Quantum Private Set Intersection Scheme Based on Bell States
Published 2025-02-01“…In our scheme, a semi-honest third party (TP) distributes the first and second qubits of the Bell states to the two users. …”
Get full text
Article -
20
Blended teaching of university mathematics courses based on Online Merge Offline model
Published 2025-12-01“…In order to study the impact of Online Merge Offline (OMO) hybrid teaching model on college mathematics courses, the article constructs a new hybrid teaching model based on the OMO model and evaluates it using a modified oriented evaluation model based on an improved multi-party weighting index algorithm (Context Evaluation-Input Evaluation-Process Evaluation-Product Evaluation, CIPP), to evaluate it. …”
Get full text
Article