Showing 8,221 - 8,240 results of 9,373 for search 'ensuring complex', query time: 0.14s Refine Results
  1. 8221

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. …”
    Get full text
    Article
  2. 8222

    THEORY AND PRACTICE OF ASSESSING THE LEVEL OF INSTABILITY OF THE EXTERNAL ENVIRONMENT OF THE ENTERPRISE IN A HYBRID WAR by I. Zapukhliak, A. Shegda, О. Mykytiuk, T. Onysenko, K. Petrenko

    Published 2022-03-01
    “…When forming an enterprise development strategy, it is necessary to take into account all components and criteria, including factors of variability and complexity of assessing the external impact on the level of enterprise instability, and their differentiation for enterprises in different sectors of the economy. …”
    Get full text
    Article
  3. 8223

    Related-Key Differential Attacks on COSB-128 by Song Dat Phuc Tran, Changhoon Lee

    Published 2015-09-01
    “…The attacks require about 2 24 data and time complexities to recover 63-bit key information and 2 22 data and time complexities to recover 6-bit key information. …”
    Get full text
    Article
  4. 8224

    Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking by Ying Wang, Yonghui Zhang

    Published 2013-06-01
    “…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
    Get full text
    Article
  5. 8225

    Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems. by Dinh Van Linh, Vu Van Yem, Hoang Thi Phuong Thao

    Published 2025-01-01
    “…A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. …”
    Get full text
    Article
  6. 8226

    Retracted: A Novel Radio Frequency Identification Collision Resolution Method Based on Statistical Learning by Zhong Dongbo

    Published 2023-01-01
    “…In addition, this method has low complexity and ensures both accuracy and robustness while quickly finding the cluster centroids. …”
    Get full text
    Article
  7. 8227

    Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking by Ying Wang, Yonghui Zhang

    Published 2013-06-01
    “…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
    Get full text
    Article
  8. 8228

    Exploring numerology for businesses: a bold leap of faith by Kumaraguru Mahadevan

    Published 2025-03-01
    “…Traditional HRM methods, such as psychometric evaluations, often fail to ensure the seamless integration of new employees into organisational cultures. …”
    Get full text
    Article
  9. 8229

    Research on continuous monitoring of cloud computing service by Xing-shu CHEN, Long GE, Yong-gang LUO, Xiang LI

    Published 2016-10-01
    “…The complexity and dynamism of cloud computing environment hardly lead to timely awareness of cloud computing service’s operating state and assessment of cloud computing service risk.In order to ensure that the security of cloud service abidingly conforms to relevant national standard,continuous monitoring of cloud computing service was researched,and the role of cloud service provider was defined,customer,and continuous monitoring,described their supervising responsibility,and assessed index system and interface specification,thus guaranteeing stable and secure employment of cloud computing service by government department and key industries.…”
    Get full text
    Article
  10. 8230

    Artificial intelligence and AI act: From the individual to the algorithm? by Gasparri Wladimiro, Tesi Francesca

    Published 2025-01-01
    “…The goal is to prevent a public decision being left solely to the 'thinking machine ', an expression of a mechanism of in differentiation that, through mathematical-computational logic, flattens individual identities (social complexity) onto data, no matter how numerous.…”
    Get full text
    Article
  11. 8231

    IMPROVEMENT OF EFFICIENCY OF USE OF LIQUID-GLASS MIXTURES. OVERVIEW INFORMATION. PART 1. MODIFICATION by A. N. Krutilin, Yu. Yu. Huminski, O. A. Rusevitch, L. V. Kulbitskaya

    Published 2018-04-01
    “…A huge number of various additives proposed to improve the knockout rate of liquid-glass mixtures is due to the complexity of the processes occurring in the mixtures at high-temperature exposure. …”
    Get full text
    Article
  12. 8232

    Toward the consensus of definitions for the phenomena of antifungal tolerance and persistence in filamentous fungi by Jorge Amich, Michael Bromley, Gustavo H. Goldman, Clara Valero

    Published 2025-04-01
    “…However, the terminology and methodology employed in the fungal community lack consensus, particularly for filamentous fungi, as they present further complexities when compared to single-celled microorganisms. …”
    Get full text
    Article
  13. 8233

    Adaptive integral sliding mode control strategy for vehicular platoon with prescribed performance by Yiguang Wang, Xubin Tang, Yongqiang Jiang, Xiaojie Li, Xiaoyan Zhan

    Published 2025-04-01
    “…A new tunnel prescribed performance function (TPPF) is designed to ensure that the design of vehicular platoon controller is independent of the initial tracking error (ITE), which can effectively reduce the design complexity. …”
    Get full text
    Article
  14. 8234

    Pedagogical conditions for the formation of Project and Design Culture of future Fine Arts teachers by Wang Jialong

    Published 2024-09-01
    “…The article is devoted to highlighting the organizational, pedagogical and didactic principles that ensure the formation of the project and design culture of future art teachers as a result of training future art teachers for design activities. …”
    Get full text
    Article
  15. 8235

    Robust AI for Financial Fraud Detection in the GCC: A Hybrid Framework for Imbalance, Drift, and Adversarial Threats by Khaleel Ibrahim Al-Daoud, Ibrahim A. Abu-AlSondos

    Published 2025-06-01
    “…The rising complexity of financial fraud in highly digitalized regions such as the Gulf Cooperation Council (GCC) poses challenging issues owing to class imbalance, adversarial attacks, concept drift, and explainability requirements. …”
    Get full text
    Article
  16. 8236

    Mathematical Foundations and Implementation of CONIKS Key Transparency by Elissa Mollakuqe, Hasan Dag, Vesna Dimitrova

    Published 2024-10-01
    “…This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. …”
    Get full text
    Article
  17. 8237

    Trends and drivers of housing affordability in the EU: Insights from panel data analysis by Josip Arnerić, Matej Kikerec, Branimir Skoko

    Published 2024-01-01
    “…Housing affordability is a crucial issue that affects both individual and societal well-being. Affordable housing ensures that households can meet their basic living needs without experiencing undue financial stress. …”
    Get full text
    Article
  18. 8238

    Multinational Mission Command: From Paper to Practice in NATO by Søren Sjøgren, Niklas Nilsson

    Published 2025-04-01
    “…This study explores the gap between written doctrine and operational practice, highlighting the complexities of implementing mission command within NATO’s diverse military landscape. …”
    Get full text
    Article
  19. 8239
  20. 8240

    Research on resource allocation algorithm in D2D networks based on alliance game by Chen Yujie, Ma Caihong

    Published 2022-02-01
    “…Due to the problems of high complexity and slow convergence in traditional alliance game algorithms, this paper proposes to establish a priority sequence to guide the initialization and formation process of alliances, thereby reducing the number of algorithm iterations and reducing system complexity. …”
    Get full text
    Article