Showing 1 - 20 results of 1,093 for search '(care OR share) function generated', query time: 0.20s Refine Results
  1. 1
  2. 2

    Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1 by M. L. Radziukevich, V. F. Golikov

    Published 2020-03-01
    “…To solve the problem of increasing the    confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the  mixing a certain number of results of individual synchronizations (convolution). …”
    Get full text
    Article
  3. 3

    Joint Cognition: Thought Contagion and the Consequences of Cooperation when Sharing the Task of Random Sequence Generation. by John Nicholas Towse, Andrea Sarah Towse, Satoru Saito, Yukio Maehara, Akira Miyake

    Published 2016-01-01
    “…Generating random number sequences is a popular psychological task often used to measure executive functioning. …”
    Get full text
    Article
  4. 4

    Research on privacy data security sharing scheme based on blockchain and function encryption by Yi LI, Jinsong WANG, Hongwei ZHANG

    Published 2022-09-01
    “…Blockchain technology has provided new ideas for data validation, data traceability, data trustworthiness, and data availability in data sharing, but privacy data security in data sharing still faces many challenges.Firstly, the current status of blockchain-based data sharing research was reviewed.Then a secure sharing model of privacy data was proposed.By encrypting the privacy data through function cryptography, and generating the proof of computational correctness through zero-knowledge proof technology, a secure and reliable data sharing with “data available but not visible” was realized.The experimental results show that the sharing delay and economic overhead of the model are within the acceptable range, which demonstrates the security and feasibility of the model.…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…Though traditional methods have used algorithms based on these concepts for secured EMD sharing, they lacked with regard for privacy and security. …”
    Get full text
    Article
  8. 8

    SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach by Omer Zekvan Yilmaz, Kubra Kalkan, Fatih Alagoz

    Published 2025-01-01
    “…Recently, network function (NF) sharing has been proposed in the literature in order to further exploit unused resources and lower the costs for network operators. …”
    Get full text
    Article
  9. 9

    Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme by Jinhong Chen, Xueguang Zhou, Wei Fu, Yihuan Mao

    Published 2024-12-01
    “…Our scheme introduces a (t, n)-threshold system that functions without a trusted center, addressing the vulnerability of single points of failure in conventional key generation centers (KGCs). …”
    Get full text
    Article
  10. 10
  11. 11

    Structural and Functional Models for Building New Generation Automated and Robotic Dairy Farms by V. V. Kirsanov

    Published 2022-03-01
    “…(Conclusions) The authors developed methods, models, structural and functional schemes for modular construction of new generation automated and robotic dairy farms of various shapes and sizes. …”
    Get full text
    Article
  12. 12

    Health Care Social Robots in the Age of Generative AI: Protocol for a Scoping Review by Paul Notger Lempe, Camille Guinemer, Daniel Fürstenau, Corinna Dressler, Felix Balzer, Thorsten Schaaf

    Published 2025-04-01
    “…ObjectiveWe present a protocol for a scoping review of the literature on the implementation of generative AI in SR in the health care sector. The aim of this scoping review is to map out the intersection of SR and generative AI in the health care sector; to explore if generative AI is applied in SR in the health care sector; to outline which models of generative AI and SR are used for these implementations; and to explore whether user acceptance is reported as an outcome following these implementations. …”
    Get full text
    Article
  13. 13
  14. 14

    Improving the core functions of primary care in a Ugandan rural district by Innocent K. Besigye, Robert J. Mash

    Published 2025-05-01
    “…Community dialogues as form of community engagement were selected as an intervention to improve the core primary care functions. Conclusion: The PCAT can generate findings to guide the development of interventions at the facility and district level to potentially improve the core functions of primary care. …”
    Get full text
    Article
  15. 15
  16. 16

    Feasibility and acceptability of switching from a previous-generation to a new-generation mask for positive airway pressure therapy of sleep apnea using remote care by Xueling Zhu, Adam Benjafield, Ross Deas, Leslee Willes, Jeff Armitstead

    Published 2024-12-01
    “…This study investigated the patient's experience when switching from a previous-generation PAP mask to a new-generation mask via remote care. …”
    Get full text
    Article
  17. 17

    An Efficient Universal Generating Function-Based Analyzing Approach for Multistate System with Imperfect Coverage Failure by Zheng Li, Jinlei Qin

    Published 2021-01-01
    “…Using the technique of the universal generating function (UGF), a component’s UGF expression with ICF can be incorporated in two steps. …”
    Get full text
    Article
  18. 18

    A pilot study of Telco’s next generation IT architecture evolution: business function virtualization (BFV) by Wen QIAO, Xiaozheng WANG, Zhenqiang SUN, Gan REN, Yunxin LIU, Aidong YANG, Peng WANG, Da WANG, Xiaozhou YE, Ye OUYANG

    Published 2022-06-01
    “…With the development of information and communication technologies, traditional telecom business support systems (BSS) are facing the challenge of agilely meeting the flexible needs from business.Application scenarization, service standardization, technology componentization and resource sharing have gradually become the consensual features among the evolution of telecom BSS architectures.A business function virtualization (BFV)-based BSS architecture, which is based on cloud-native, micro-services, containers, and DevOps technologies, was proposed.By embedding four components into the architecture, including standardized virtual network functions, modular design orchestrator, micro-service management framework, and multi-plane elastic computing controller, the system is able to deploy unitized system and distributed cloud.Therefore, the requirements of flexible telecom business development and frequent evolution of the system could be satisfied by the proposed BFV-based BSS architecture.In other words, the lightweight delivery of IT technologies and agile business support could be fulfilled by using the proposed BFV-based BSS architecture, and the proposed architecture will eventually become the standard architecture of next generation telecom BSS.…”
    Get full text
    Article
  19. 19

    PROBABILITY ANALYSIS ON LAST PLY FAILURE OF COMPOSITE LAMINATES BASED ON UNIVERSAL GENERATING FUNCTION METHOD by LIU ChengLong, ZHOU JinYu, QIU Rui, ZHUANG BaiLiang, HU Jian

    Published 2020-01-01
    “…The reliability of composite laminates is analyzed by universal generating function method. Load,strength parameters universal generating function,complex operators and the corresponding performance structure functions are defined,the resistance of the single layer,resistance sequences and system resistance universal generating function are constructed respectively. …”
    Get full text
    Article
  20. 20

    A pilot study of Telco’s next generation IT architecture evolution: business function virtualization (BFV) by Wen QIAO, Xiaozheng WANG, Zhenqiang SUN, Gan REN, Yunxin LIU, Aidong YANG, Peng WANG, Da WANG, Xiaozhou YE, Ye OUYANG

    Published 2022-06-01
    “…With the development of information and communication technologies, traditional telecom business support systems (BSS) are facing the challenge of agilely meeting the flexible needs from business.Application scenarization, service standardization, technology componentization and resource sharing have gradually become the consensual features among the evolution of telecom BSS architectures.A business function virtualization (BFV)-based BSS architecture, which is based on cloud-native, micro-services, containers, and DevOps technologies, was proposed.By embedding four components into the architecture, including standardized virtual network functions, modular design orchestrator, micro-service management framework, and multi-plane elastic computing controller, the system is able to deploy unitized system and distributed cloud.Therefore, the requirements of flexible telecom business development and frequent evolution of the system could be satisfied by the proposed BFV-based BSS architecture.In other words, the lightweight delivery of IT technologies and agile business support could be fulfilled by using the proposed BFV-based BSS architecture, and the proposed architecture will eventually become the standard architecture of next generation telecom BSS.…”
    Get full text
    Article