Showing 1 - 20 results of 1,052 for search '(core OR (share OR smore)) function generated', query time: 0.16s Refine Results
  1. 1
  2. 2

    Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1 by M. L. Radziukevich, V. F. Golikov

    Published 2020-03-01
    “…To solve the problem of increasing the    confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the  mixing a certain number of results of individual synchronizations (convolution). …”
    Get full text
    Article
  3. 3

    Identification of shared viral sequences in peat moss metagenomes reveals elements of a possible Sphagnum core virome by Elizabeth R. Denison, Helena L. Pound, Eric R. Gann, Naomi E. Gilbert, David J. Weston, Dale A. Pelletier, Steven W. Wilhelm

    Published 2025-06-01
    “…Identifying viruses that are shared between individual plants, or members of the “core virome”, could reveal stable viral populations with the potential to modulate the composition and function of the microbiome. …”
    Get full text
    Article
  4. 4

    Improving the core functions of primary care in a Ugandan rural district by Innocent K. Besigye, Robert J. Mash

    Published 2025-05-01
    “…Community dialogues as form of community engagement were selected as an intervention to improve the core primary care functions. Conclusion: The PCAT can generate findings to guide the development of interventions at the facility and district level to potentially improve the core functions of primary care. …”
    Get full text
    Article
  5. 5
  6. 6

    Joint Cognition: Thought Contagion and the Consequences of Cooperation when Sharing the Task of Random Sequence Generation. by John Nicholas Towse, Andrea Sarah Towse, Satoru Saito, Yukio Maehara, Akira Miyake

    Published 2016-01-01
    “…Generating random number sequences is a popular psychological task often used to measure executive functioning. …”
    Get full text
    Article
  7. 7

    Research on privacy data security sharing scheme based on blockchain and function encryption by Yi LI, Jinsong WANG, Hongwei ZHANG

    Published 2022-09-01
    “…Blockchain technology has provided new ideas for data validation, data traceability, data trustworthiness, and data availability in data sharing, but privacy data security in data sharing still faces many challenges.Firstly, the current status of blockchain-based data sharing research was reviewed.Then a secure sharing model of privacy data was proposed.By encrypting the privacy data through function cryptography, and generating the proof of computational correctness through zero-knowledge proof technology, a secure and reliable data sharing with “data available but not visible” was realized.The experimental results show that the sharing delay and economic overhead of the model are within the acceptable range, which demonstrates the security and feasibility of the model.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…Though traditional methods have used algorithms based on these concepts for secured EMD sharing, they lacked with regard for privacy and security. …”
    Get full text
    Article
  12. 12

    CREATIVE CORE WITHIN THE SCIENTIFIC RESEARCH OF EDUCATIONAL PROBLEMS by Vladimir I. Zagvyazinsky, Alfia F. Zakirova

    Published 2015-03-01
    “…The content of such notions as «concept», «creative core», «idea», «plot», and «research hypothesis» is revealed. …”
    Get full text
    Article
  13. 13
  14. 14

    Are we there yet? Evaluation of AI-generated metadata for online information resources by Vyacheslav Zavalin, Oksana L. Zavalina

    Published 2025-03-01
    “…This experimental study assessed the quality of AI-generated descriptive metadata in 4 most widely used standards: Dublin core, MODS, MARC, and BIBFRAME. …”
    Get full text
    Article
  15. 15

    SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach by Omer Zekvan Yilmaz, Kubra Kalkan, Fatih Alagoz

    Published 2025-01-01
    “…Recently, network function (NF) sharing has been proposed in the literature in order to further exploit unused resources and lower the costs for network operators. …”
    Get full text
    Article
  16. 16

    Core-Sheath Structured Yarn for Biomechanical Sensing in Health Monitoring by Wenjing Fan, Cheng Li, Bingping Yu, Te Liang, Junrui Li, Dapeng Wei, Keyu Meng

    Published 2025-05-01
    “…The rapidly evolving field of functional yarns has garnered substantial research attention due to their exceptional potential in enabling next-generation electronic textiles for wearable health monitoring, human–machine interfaces, and soft robotics. …”
    Get full text
    Article
  17. 17

    Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme by Jinhong Chen, Xueguang Zhou, Wei Fu, Yihuan Mao

    Published 2024-12-01
    “…Our scheme introduces a (t, n)-threshold system that functions without a trusted center, addressing the vulnerability of single points of failure in conventional key generation centers (KGCs). …”
    Get full text
    Article
  18. 18
  19. 19

    Shotgun metagenomics dataset of the core rhizo-microbiome of monoculture and soybean-precedent carrot by Olubukola Oluranti Babalola, Alaba Adewole Adebayo, Ben Jesuorsemwen Enagbonma

    Published 2025-04-01
    “…Abstract Objectives Carrot is a significant vegetable crop contributing to agricultural diversity and food security, but less is known about the core microbiome associated with its rhizosphere. …”
    Get full text
    Article
  20. 20

    Beyond the surface of capacity building: a mixed-methods study of the core functions and forms of dissemination and implementation science consultations by Kera N. Swanson, Nicole A. Stadnick, Gregory A. Aarons, Lauren Brookman-Frazee, Isaac Bouchard, Zeying Du, Anna G. Brubaker, Carrie Geremia, Kelli Cain, Lilliana R. Conradi, Marisa Sklar, Clare Viglione, Borsika A. Rabin

    Published 2025-08-01
    “…Methods Consultation notes from the three programs were extracted for content analysis to identify discussion topics, DIS guidance provided, and resources shared. Generative artificial intelligence (ChatGPT Plus) facilitated content analyses with multiple rounds of validation from program consultants to refine and finalize themes. …”
    Get full text
    Article