-
1
SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach
Published 2025-01-01“…Recently, network function (NF) sharing has been proposed in the literature in order to further exploit unused resources and lower the costs for network operators. …”
Get full text
Article -
2
Self-referential belief shares common neural correlates with general belief
Published 2025-01-01Get full text
Article -
3
Meromorphic functions sharing the zeros of lower degree symmetric polynomials in weighted wider sense
Published 2025-03-01Subjects: “…meromorphic functions…”
Get full text
Article -
4
-
5
Generalized Propensity Score Matching with Multilevel Treatment Options
Published 2013-03-01“…Results are compared with multivariate regression analysis, where the generalized linear model is used with gamma family and log link function…”
Get full text
Article -
6
Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1
Published 2020-03-01“…To solve the problem of increasing the confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the mixing a certain number of results of individual synchronizations (convolution). …”
Get full text
Article -
7
The Uniqueness of Analytic Functions on Annuli Sharing Some Values
Published 2012-01-01Get full text
Article -
8
Generalized Score Comparison-Based Learning Objective for Deep Speaker Embedding
Published 2025-01-01“…Furthermore, we propose a generalized loss function for score comparison-based learning, encompassing many conventional training losses and regularization techniques. …”
Get full text
Article -
9
Uniqueness of Meromorphic Functions With Nonlinear Differential Polynomials Sharing a Small Function IM
Published 2023-12-01“…Additionally, for two distinct meromorphic functions $f$ and $g$, both of finite order, if the differential-difference polynomials $[f^{n}f(z+c)]^{(k)}$\ and\ $[g^{n}g(z+c)]^{(k)}$ share the value $1$ in the same set, then $f(z)=c_1e^{dz},$ $g(z)=c_2e^{-dz}.$ We prove two results, which significantly generalize the results of Dyavanal and Mathai (Ukrainian Math. …”
Get full text
Article -
10
Graph neural processes for molecules: an evaluation on docking scores and strategies to improve generalization
Published 2024-10-01“…Molecular property prediction is one such research area that is characterized by sparse datasets of many functions on a shared molecular space. In this paper, we study the application of graph NPs to molecular property prediction with DOCKSTRING, a diverse dataset of docking scores. …”
Get full text
Article -
11
Evaluation of Bayesian network scoring functions in polychotomous data analysis
Published 2025-05-01“…Among these, the BDe scoring function requires specifying hyperparameters that influence the priors on the network parameters. …”
Get full text
Article -
12
A new result for entire functions and their shifts with two shared values
Published 2025-04-01“…Let ff be a transcendental entire function of hyperorder strictly less than 1, and let cc be a nonzero finite complex number. …”
Get full text
Article -
13
Impacts of efficiency on food security status of smallholders in the Gurage Zone of Ethiopia
Published 2025-12-01Subjects: Get full text
Article -
14
Joint Cognition: Thought Contagion and the Consequences of Cooperation when Sharing the Task of Random Sequence Generation.
Published 2016-01-01“…Generating random number sequences is a popular psychological task often used to measure executive functioning. …”
Get full text
Article -
15
Research on privacy data security sharing scheme based on blockchain and function encryption
Published 2022-09-01“…Blockchain technology has provided new ideas for data validation, data traceability, data trustworthiness, and data availability in data sharing, but privacy data security in data sharing still faces many challenges.Firstly, the current status of blockchain-based data sharing research was reviewed.Then a secure sharing model of privacy data was proposed.By encrypting the privacy data through function cryptography, and generating the proof of computational correctness through zero-knowledge proof technology, a secure and reliable data sharing with “data available but not visible” was realized.The experimental results show that the sharing delay and economic overhead of the model are within the acceptable range, which demonstrates the security and feasibility of the model.…”
Get full text
Article -
16
Unique and shared influences of anxiety and ADHD on the behavioral profile of autism in early childhood
Published 2025-06-01Get full text
Article -
17
-
18
-
19
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Though traditional methods have used algorithms based on these concepts for secured EMD sharing, they lacked with regard for privacy and security. …”
Get full text
Article -
20
Anesthesiological management in endovascular mechanical thrombectomy: a propensity score-matched retrospective analysis in Italy
Published 2025-05-01“…Background Endovascular mechanical thrombectomy (EMT) can be performed with general anesthesia (GA) or using non-GA techniques. …”
Get full text
Article