Suggested Topics within your search.
Suggested Topics within your search.
-
8221
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. …”
Get full text
Article -
8222
THEORY AND PRACTICE OF ASSESSING THE LEVEL OF INSTABILITY OF THE EXTERNAL ENVIRONMENT OF THE ENTERPRISE IN A HYBRID WAR
Published 2022-03-01“…When forming an enterprise development strategy, it is necessary to take into account all components and criteria, including factors of variability and complexity of assessing the external impact on the level of enterprise instability, and their differentiation for enterprises in different sectors of the economy. …”
Get full text
Article -
8223
Related-Key Differential Attacks on COSB-128
Published 2015-09-01“…The attacks require about 2 24 data and time complexities to recover 63-bit key information and 2 22 data and time complexities to recover 6-bit key information. …”
Get full text
Article -
8224
Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking
Published 2013-06-01“…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
Get full text
Article -
8225
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems.
Published 2025-01-01“…A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. …”
Get full text
Article -
8226
Retracted: A Novel Radio Frequency Identification Collision Resolution Method Based on Statistical Learning
Published 2023-01-01“…In addition, this method has low complexity and ensures both accuracy and robustness while quickly finding the cluster centroids. …”
Get full text
Article -
8227
Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking
Published 2013-06-01“…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
Get full text
Article -
8228
Exploring numerology for businesses: a bold leap of faith
Published 2025-03-01“…Traditional HRM methods, such as psychometric evaluations, often fail to ensure the seamless integration of new employees into organisational cultures. …”
Get full text
Article -
8229
Research on continuous monitoring of cloud computing service
Published 2016-10-01“…The complexity and dynamism of cloud computing environment hardly lead to timely awareness of cloud computing service’s operating state and assessment of cloud computing service risk.In order to ensure that the security of cloud service abidingly conforms to relevant national standard,continuous monitoring of cloud computing service was researched,and the role of cloud service provider was defined,customer,and continuous monitoring,described their supervising responsibility,and assessed index system and interface specification,thus guaranteeing stable and secure employment of cloud computing service by government department and key industries.…”
Get full text
Article -
8230
Artificial intelligence and AI act: From the individual to the algorithm?
Published 2025-01-01“…The goal is to prevent a public decision being left solely to the 'thinking machine ', an expression of a mechanism of in differentiation that, through mathematical-computational logic, flattens individual identities (social complexity) onto data, no matter how numerous.…”
Get full text
Article -
8231
IMPROVEMENT OF EFFICIENCY OF USE OF LIQUID-GLASS MIXTURES. OVERVIEW INFORMATION. PART 1. MODIFICATION
Published 2018-04-01“…A huge number of various additives proposed to improve the knockout rate of liquid-glass mixtures is due to the complexity of the processes occurring in the mixtures at high-temperature exposure. …”
Get full text
Article -
8232
Toward the consensus of definitions for the phenomena of antifungal tolerance and persistence in filamentous fungi
Published 2025-04-01“…However, the terminology and methodology employed in the fungal community lack consensus, particularly for filamentous fungi, as they present further complexities when compared to single-celled microorganisms. …”
Get full text
Article -
8233
Adaptive integral sliding mode control strategy for vehicular platoon with prescribed performance
Published 2025-04-01“…A new tunnel prescribed performance function (TPPF) is designed to ensure that the design of vehicular platoon controller is independent of the initial tracking error (ITE), which can effectively reduce the design complexity. …”
Get full text
Article -
8234
Pedagogical conditions for the formation of Project and Design Culture of future Fine Arts teachers
Published 2024-09-01“…The article is devoted to highlighting the organizational, pedagogical and didactic principles that ensure the formation of the project and design culture of future art teachers as a result of training future art teachers for design activities. …”
Get full text
Article -
8235
Robust AI for Financial Fraud Detection in the GCC: A Hybrid Framework for Imbalance, Drift, and Adversarial Threats
Published 2025-06-01“…The rising complexity of financial fraud in highly digitalized regions such as the Gulf Cooperation Council (GCC) poses challenging issues owing to class imbalance, adversarial attacks, concept drift, and explainability requirements. …”
Get full text
Article -
8236
Mathematical Foundations and Implementation of CONIKS Key Transparency
Published 2024-10-01“…This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. …”
Get full text
Article -
8237
Trends and drivers of housing affordability in the EU: Insights from panel data analysis
Published 2024-01-01“…Housing affordability is a crucial issue that affects both individual and societal well-being. Affordable housing ensures that households can meet their basic living needs without experiencing undue financial stress. …”
Get full text
Article -
8238
Multinational Mission Command: From Paper to Practice in NATO
Published 2025-04-01“…This study explores the gap between written doctrine and operational practice, highlighting the complexities of implementing mission command within NATO’s diverse military landscape. …”
Get full text
Article -
8239
pH-Sensitive Multiliposomal Containers for Encapsulation and Rapid Release of Bioactive Substances
Published 2025-06-01“…The multiliposomal complexes and products of their biodegradation demonstrated low cytotoxicity. …”
Get full text
Article -
8240
Research on resource allocation algorithm in D2D networks based on alliance game
Published 2022-02-01“…Due to the problems of high complexity and slow convergence in traditional alliance game algorithms, this paper proposes to establish a priority sequence to guide the initialization and formation process of alliances, thereby reducing the number of algorithm iterations and reducing system complexity. …”
Get full text
Article