-
1
SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach
Published 2025-01-01“…Recently, network function (NF) sharing has been proposed in the literature in order to further exploit unused resources and lower the costs for network operators. …”
Get full text
Article -
2
Meromorphic functions sharing the zeros of lower degree symmetric polynomials in weighted wider sense
Published 2025-03-01Subjects: “…meromorphic functions…”
Get full text
Article -
3
Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1
Published 2020-03-01“…To solve the problem of increasing the confidentiality of the generated shared secret, if it is used as a cryptographic key, it is proposed to use the mixing a certain number of results of individual synchronizations (convolution). …”
Get full text
Article -
4
Joint Cognition: Thought Contagion and the Consequences of Cooperation when Sharing the Task of Random Sequence Generation.
Published 2016-01-01“…Generating random number sequences is a popular psychological task often used to measure executive functioning. …”
Get full text
Article -
5
Research on privacy data security sharing scheme based on blockchain and function encryption
Published 2022-09-01“…Blockchain technology has provided new ideas for data validation, data traceability, data trustworthiness, and data availability in data sharing, but privacy data security in data sharing still faces many challenges.Firstly, the current status of blockchain-based data sharing research was reviewed.Then a secure sharing model of privacy data was proposed.By encrypting the privacy data through function cryptography, and generating the proof of computational correctness through zero-knowledge proof technology, a secure and reliable data sharing with “data available but not visible” was realized.The experimental results show that the sharing delay and economic overhead of the model are within the acceptable range, which demonstrates the security and feasibility of the model.…”
Get full text
Article -
6
-
7
-
8
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Though traditional methods have used algorithms based on these concepts for secured EMD sharing, they lacked with regard for privacy and security. …”
Get full text
Article -
9
Direct Conditional Score Modeling for Accelerated MRI Reconstruction
Published 2024-01-01“…This paper presents a novel approach called Direct Conditional Score (DCS) modeling that directly models the conditional score function, eliminating the need for separate likelihood terms. …”
Get full text
Article -
10
Generating diversity and securing completeness in algorithmic retrosynthesis
Published 2025-05-01“…In order to generate a diverse set of synthesis plans for chemists to select from, we capture the concept of diversity in a novel chemical diversity score (CDS). …”
Get full text
Article -
11
Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme
Published 2024-12-01“…Our scheme introduces a (t, n)-threshold system that functions without a trusted center, addressing the vulnerability of single points of failure in conventional key generation centers (KGCs). …”
Get full text
Article -
12
High survivorship and excellent functional outcome in third‐generation patellofemoral arthroplasty
Published 2025-04-01Get full text
Article -
13
-
14
Prognostic value of the Naples Prognostic Score in adult chronic obstructive pulmonary disease: NHANES 2005–2018
Published 2024-12-01“…BackgroundPrevious studies have demonstrated that the Naples Prognostic Score (NPS) provides strategic direction in the prognosis of malignant illness. …”
Get full text
Article -
15
Second-generation long-acting injectable antipsychotics in schizophrenia: patient functioning and quality of life
Published 2016-04-01“…Meaningful differences have been observed between SGA-LAIs in the onset of their clinical efficacy and in the relationships between symptoms and functioning scores. Moreover, head-to-head studies comparing the effects of SGA-LAIs on classical measures of psychopathology and functioning are available mainly on risperidone LAI, while those comparing olanzapine LAI with other SGA-LAIs are still lacking. …”
Get full text
Article -
16
-
17
Clinical functioning information tool – coronavirus disease 2019 (ClinFIT COVID-19): psychometric evaluation and development of an interval-scaled functioning score across the care...
Published 2025-08-01“…Methods: Three context-specific versions (13–16 ICF categories) of ClinFIT-COVID-19 were administered to collect information on patient functioning. Rasch analysis examined psychometric properties and generated conversion tables from ordinal raw scores to a 0–100 interval metric. …”
Get full text
Article -
18
Protocol to analyze deep-learning-predicted functional scores for noncoding de novo variants and their correlation with complex brain traits
Published 2025-06-01“…Here, we present a protocol for prioritizing variants by generating deep-learning-predicted functional scores and relating them with brain traits. …”
Get full text
Article -
19
An Efficient Universal Generating Function-Based Analyzing Approach for Multistate System with Imperfect Coverage Failure
Published 2021-01-01“…Using the technique of the universal generating function (UGF), a component’s UGF expression with ICF can be incorporated in two steps. …”
Get full text
Article -
20
A pilot study of Telco’s next generation IT architecture evolution: business function virtualization (BFV)
Published 2022-06-01“…With the development of information and communication technologies, traditional telecom business support systems (BSS) are facing the challenge of agilely meeting the flexible needs from business.Application scenarization, service standardization, technology componentization and resource sharing have gradually become the consensual features among the evolution of telecom BSS architectures.A business function virtualization (BFV)-based BSS architecture, which is based on cloud-native, micro-services, containers, and DevOps technologies, was proposed.By embedding four components into the architecture, including standardized virtual network functions, modular design orchestrator, micro-service management framework, and multi-plane elastic computing controller, the system is able to deploy unitized system and distributed cloud.Therefore, the requirements of flexible telecom business development and frequent evolution of the system could be satisfied by the proposed BFV-based BSS architecture.In other words, the lightweight delivery of IT technologies and agile business support could be fulfilled by using the proposed BFV-based BSS architecture, and the proposed architecture will eventually become the standard architecture of next generation telecom BSS.…”
Get full text
Article