Suggested Topics within your search.
Suggested Topics within your search.
-
15021
Planning of career growth of agricultural enterprises staff
Published 2024-12-01“…The works of foreign researchers are studied and an algorithm for planning career growth for employees of agricultural enterprises is generalized, which will contribute to successful career formation. …”
Get full text
Article -
15022
Feature Variable Selection Based on VIS-NIR Spectra and Soil Moisture Content Prediction Model Construction
Published 2024-01-01“…The investigation looked at how changes in the soil moisture content impacted the response of the soil spectra. The researchers used a genetic algorithm (GA), interval combination optimization (ICO), and competitive adaptive reweighted sampling (CARS) to filter feature variables from full-band spectral data. …”
Get full text
Article -
15023
THE IMPORTANCE OF TARGETED NEXT-GENERATION SEQUENCING USAGE IN CYTOGENETICALLY NORMAL MYELOID MALIGNANCIES
Published 2021-01-01“…In this paper, we drew an algorithm for evaluation of the myeloid malignancies. …”
Get full text
Article -
15024
-
15025
Enhancing Resilience and Efficiency in Power System: A Five-Level Dynamic Planning Model
Published 2024-01-01“…Researchers consider the planning of power systems to be of utmost importance, and due to its significant budget, further studies on the resilience of energy systems are necessary. …”
Get full text
Article -
15026
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…At present, most of the gait-based smartphone authentication researches focus on a single controlled scenario without considering the impact of multi-scenario changes on the authentication accuracy.The movement direction of the smartphone and the user changes in different scenarios, and the user’s gait data collected by the orientation-sensitive sensor will be biased accordingly.Therefore, it has become an urgent problem to provide a multi-scenario high-accuracy gait authentication method for smartphones.In addition, the selection of the model training algorithm determines the accuracy and efficiency of gait authentication.The current popular authentication model based on long short-term memory (LSTM) network can achieve high authentication accuracy, but it has many training parameters, large memory footprint, and the training efficiency needs to be improved.In order to solve the above problems a multi-scenario gait authentication scheme for smartphones based on Gate Recurrent Unit (GRU) was proposed.The gait signals were preliminarily denoised by wavelet transform, and the looped gait signals were segmented by an adaptive gait cycle segmentation algorithm.In order to meet the authentication requirements of multi-scenario, the coordinate system transformation method was used to perform direction-independent processing on the gait signals, so as to eliminate the influence of the orientation of the smartphone and the movement of the user on the authentication result.Besides, in order to achieve high-accuracy authentication and efficient model training, GRUs with different architectures and various optimization methods were used to train the gait model.The proposed scheme was experimentally analyzed on publicly available datasets PSR and ZJU-GaitAcc.Compared with the related schemes, the proposed scheme improves the authentication accuracy.Compared with the LSTM-based gait authentication model, the training efficiency of the proposed model is improved by about 20%.…”
Get full text
Article -
15027
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
15028
The Safety of Hyperbaric Oxygen Therapy in the Treatment of Covid-19
Published 2020-10-01Get full text
Article -
15029
-
15030
RATIONAL USE OF NONSTEROIDAL ANTI-INFLAMMATORY DRUGS. CLINICAL GUIDELINES
Published 2018-05-01Get full text
Article -
15031
Diagnosis of gastrointestinal fistulas in pancreatic necrosis by X-ray and computed tomography
Published 2025-01-01“…The purpose of the study: to clarify the possibilities of using X-ray research methods in the framework of a comprehensive diagnosis of gastrointestinal fistulas in pancreatic necrosis.Materials and methods. …”
Get full text
Article -
15032
-
15033
TelescopeML. II. Convolutional Neural Networks for Predicting Brown Dwarf Atmospheric Parameters
Published 2025-01-01Get full text
Article -
15034
-
15035
Exploring the Realization of Creative Dimensions within the Metaverse: The Case of Tabriz Metropolis
Published 2025-06-01“…To ascertain the relative importance of research components, 20 experts were consulted using the preferential weighting evaluation ratio algorithm (SOARA). …”
Get full text
Article -
15036
Congenital cytomegalovirus infection and its impact on the auditory function
Published 2019-10-01“…The aim is to assess the frequency and time of hearing loss occurrence in children with congenital cytomegalovirus infection and to develop the audiological follow-up algorithm adapted for those children. Materials and methods: 60 children with verified congenital cytomegalovirus infection have been involved into research as the main group. 61 children, with other sensorineural hearing loss risk factors, but excluding congenital cytomegalovirus, were included into the comparison group. …”
Get full text
Article -
15037
-
15038
Factors Influencing Misinformation Propagation: A Systemic Review
Published 2024-12-01“…The study also identified some limitations of current studies, including an excessive focus on the political and health issues, a lack of attention to how information characteristics, intervention factors, and platform characteristics play a role, and the relative simplicity of the research methods. Future studies should focus on misinformation propagation in other scenarios, explore more information characteristics suitable for algorithmic intervention, examine the differences in misinformation propagation on different platforms, and use mixed research methods to reach more credible conclusions. …”
Get full text
Article -
15039
-
15040