Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
16801
Comparing Fast Fourier Transform and Prony Method for Analysing Frequency Oscillation in Real Power System Interconnection
Published 2025-05-01“…To assess power system oscillations and demonstrate the actual application in a real grid system, this research compares two popular signal processing methods: Prony’s approach and the Fast Fourier Transform from Phasor Measurement Unit data in the Java Bali (Indonesia) power system interconnection. …”
Get full text
Article -
16802
User Satisfaction Analysis of University of Jember's UC3 using EUCS Approach
Published 2025-09-01“…The UC3 service is the University of Jember's integrated digital platform, facilitating academic services including diploma applications, service complaints, and campus problem reporting. …”
Get full text
Article -
16803
Inspection of railway catenary systems using machine learning with domain knowledge integration
Published 2025-08-01“…This objective is achieved by assessing the technical condition of the infrastructure and maintaining a comprehensive inventory of its components. The application of machine learning methods to this problem is non-trivial, due to various constraints, including the cost of data acquisition. …”
Get full text
Article -
16804
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
16805
получавших лечение. При этом наблюдается значительно меньшая частота развития побочных эффекModern therapeutic modes of treatment of autoimmune hepatitis...
Published 2009-08-01“…In the review the data on epidemiology, clinical, diagnostics and main therapeutic strategy at autoimmune hepatitis are covered.Conclusion. …”
Get full text
Article -
16806
Peningkatan Kemahiran Membaca Intensif Melalui Teknik Pembelajaran SQ4-R (Penelitian Tindakan Kelas Pada Mahsiswa Jurusan Pendndidikan Bahasa Arab Fakultas Tarbiyah dan Keguruan IA...
Published 2014-12-01“…Data were analyzed qualitatively by reducing, presenting and with drawing conclusion. …”
Get full text
Article -
16807
Healthcare Provider’s Knowledge about Childhood Autism at Baghdad Medical City
Published 2024-06-01“…Data was analyzed through the application of the descriptive statistical analysis (frequency, percentage, mean, and mean of score). …”
Get full text
Article -
16808
MAN 4 Aceh Besar في تدريس الاستماع بـــ Fun Easy Learn Arabic استخدام برنامج
Published 2024-12-01“…The tools used to collect data were a test list, namely pre-test and post-test. …”
Get full text
Article -
16809
FDIA Attack Detection Technique for Smart Grids Based on Graph Reconstruction and Spatio-Temporal Joint Modeling
Published 2025-01-01“…With the widespread application of smart grids, the false data injection attack (FDIA) has become a major threat to power grid security. …”
Get full text
Article -
16810
HBIM, 3D drawing and virtual reality for archaeological sites and ancient ruins
Published 2020-07-01“…Data collection, documentation and analysis of the traces of ancient ruins and archaeological sites represent an inestimable value to be handed down to future generations. …”
Get full text
Article -
16811
Protocol for spatial metabolomics and isotope tracing in the mouse brain
Published 2025-06-01“…We then detail procedures for matrix application, ion identification, and data analysis. …”
Get full text
Article -
16812
A Study of Betawi Architecture in Setu Babakan, Jakarta
Published 2021-04-01“…The research method used a descriptive method based on empirical facts. The data of this research consisted of primary and secondary data obtained from literature and existing field conditions. …”
Get full text
Article -
16813
INFORMATION TECHNOLOGY ADOPTION IN NIGERIAN LOCAL GOVERNMENT ADMINISTRATION; PERSPECTIVES CHALLENGES AND PROSPECTS
Published 2024-07-01“…The paper adopted the qualitative / secondary method of data collection and analysis. It used theoretical perspectives of the democratic participation, globalization, development school and localist. …”
Get full text
Article -
16814
Assessment of Hydration Mechanisms, Rheological Behavior, and Sorptivity of Portland Cement Pastes Using Low-Cost Arduino Platform-Based Sensors
Published 2022-01-01“…The recorded temperature and moisture content data were transmitted using the Android application and the Wi-Fi modem router. …”
Get full text
Article -
16815
Financing of scientific research projects at the University of Defence
Published 2025-01-01“…Using SPSS software, financial data was analyzed with the aim of enhancing the management of scientific research projects at the University of Defence. …”
Get full text
Article -
16816
Integration of Biochar with Vermicompost and Compost Improves Agro-Physiological Properties and Nutritional Quality of Greenhouse Sweet Pepper
Published 2024-11-01“…All applied treatments were distributed randomly, and each treatment was repeated three times over two seasons. The data analysis revealed that the application of vermicompost—alone or in combination with biochar—significantly increased the plant growth measurements (plant height, SPAD value, leaf area, No. of leaves, and No. of branches), leaf nutrient content (N, P, K, and Ca), and total yield in both seasons. …”
Get full text
Article -
16817
Research on Mount Wilson Magnetic Classification Based on Deep Learning
Published 2021-01-01Get full text
Article -
16818
-
16819
Response mechanism of major secondary metabolites of Polygonatum kingianum to selenium nanoparticles
Published 2024-12-01Get full text
Article -
16820