Showing 1 - 20 results of 232 for search 'shared ability problems', query time: 0.11s Refine Results
  1. 1
  2. 2

    Research of the problems of project financing of construction of residential real estate using the escrow account mechanism by I. A. Pantyukov, V. A. Opekunov

    Published 2021-07-01
    “…The publication considers the main problems of financing investment and construction projects, as well as the use of the escrow account mechanism. …”
    Get full text
    Article
  3. 3

    Is the beneficiary pays principle essential in climate justice? by Clare Heyward

    Published 2021-01-01
    “…In the philosophical literature on climate justice, it has typically been cashed out in terms of the following three principles: the ability to pay principle (APP), the beneficiary pays principle (BPP), and the contribution to problem principle (CPP). …”
    Get full text
    Article
  4. 4

    Data sharing scheme for 5G IoT based on blockchain by Kang QIAO, Wei YOU, Lingwei WANG, Hongbo TANG

    Published 2020-08-01
    “…The massive amount of IoT data has great value,but the existing cloud-based data sharing mechanism faces problems such as single points of failure and internal leakage,which can not ensure the secure sharing of user data.In order to achieve efficient and reliable data sharing,the blockchain technology was used to propose a 5G IoT data sharing scheme based on blockchain.Firstly,the proposed scheme designed data sharing framework and data sharing process,based on the lightning network solution,an off-chain transaction mechanism for data sharing of the internet of things was proposed.Experimental analysis shows that the 5G IoT data sharing framework based on blockchain has strong anti-attack ability and the off-chain transaction mechanism based on lightning network can greatly increase transaction throughput and reduce transaction delay.…”
    Get full text
    Article
  5. 5

    Adaptation of the modular number system in threshold secret sharing schemes by A. F. Chernyavskiy, A. I. Kazlova, V. S. Sadov, A. A. Kolyada

    Published 2025-03-01
    “…Shamir’s scheme was chosen as optimal in terms of complexity, resource intensity, perfection and ideality; in addition, it is scalable – the number of participants can be increased to the order of the field p, without changing the ability to recover the secret. A masking transformation using a term with a pseudo-random integer value C for the shared secret S, the range of change of the pseudo-random parameter C agreed upon the range of changes in the values of the original signal is applied. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Design and Application of Railway Locomotive Maintenance Data Integration and Sharing Platform by ZHAO Chao, YANG Yongtao, LAN Fan

    Published 2024-04-01
    “…In order to solve the problems of difficult data integration, complex governance and low sharing efficiency, this paper proposes a scheme for construction of railway locomotive maintenance data integration and sharing platform. …”
    Get full text
    Article
  9. 9

    Developing a knowledge sharing strategy for a South African IT consultancy by Daniëlle Swanepoel, Paul Laughton, Anika Meyer

    Published 2025-06-01
    “…Conclusion: In summary, this study concludes with the development of a customised knowledge sharing strategy, with the intention to increase the IT consultants’ ability to deliver better products and enhance their problem-solving abilities. …”
    Get full text
    Article
  10. 10
  11. 11

    Ten simple rules for the sharing of bacterial genotype-Phenotype data on antimicrobial resistance. by Leonid Chindelevitch, Maarten van Dongen, Heather Graz, Antonio Pedrotta, Anita Suresh, Swapna Uplekar, Elita Jauneikaite, Nicole Wheeler

    Published 2023-06-01
    “…We hope that these rules can shed light on often overlooked but nonetheless very necessary aspects of AMR data sharing and enhance the field's ability to address the problems of understanding AMR mechanisms, tracking their emergence and spread in populations, and predicting microbial susceptibility to antimicrobials for diagnostic purposes.…”
    Get full text
    Article
  12. 12

    PROBLEMS OF DIGITALIZATION OF THE RUSSIAN INDUSTRY by Y. S. Bogachev, P. V. Trifonov, N. M. Abdikeev

    Published 2022-10-01
    “…Recommendations are given on the creation of an ecosystem structure, mechanisms for the interaction of its various elements, a management and coordination system based on digital technologies for creating a system of individual elements that form information and analytical centers in various functional areas of the ecosystem.A model of the ecosystem of industrial and technological development of the Russian economy based on digital technologies is proposed.A set of mechanisms that contribute to reducing the level of uncertainty is proposed, and a design method of interaction within the framework of the digital industrial enterprise technology platform model is described.The article formulates recommendations for the digitalization of an industrial enterprise in the new technological conditions of economic and social development, in the so-called new technological paradigm “Industry 4.0”, the characteristic features of which are minimal use of manual and mechanized labor, as well as a low level of transaction costs.A new approach is proposed, on the basis of which industrial enterprises will interact on the basis of shared access to information and digital resources and the ability to combine the development of innovative projects and value chains necessary to create competitive products in order to increase the operational efficiency of enterprises.…”
    Get full text
    Article
  13. 13

    A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment by Mustafa Azeez AL Mayyahi, Seyed Amin Hosseini Seno

    Published 2022-12-01
    “…According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy. …”
    Get full text
    Article
  14. 14

    USING COOPERATIVE LEARNING IN TEACHING NARRATIVE TEXT TO IMPROVE STUDENTS’ ABILITY IN READING COMPREHENSION by Hidayah Nor

    Published 2017-05-01
    “…I tried to solve the problem of the eighth grade students of junior high school in reading skill particularly in this case to improve their ability in understanding narrative text. …”
    Get full text
    Article
  15. 15

    Fructose activates a stress response shared by methylglyoxal and hydrogen peroxide in Streptococcus mutans by Alejandro R. Walker, Danniel N. Pham, Payam Noeparvar, Alexandra M. Peterson, Marissa K. Lipp, José A. Lemos, Lin Zeng

    Published 2025-05-01
    “…In conclusion, fructose metabolism is integrated into the stress core of S. mutans and regulates critical functions required for survival and its ability to induce dysbiosis in the oral cavity.IMPORTANCEFructose is a common monosaccharide in the biosphere, yet its overconsumption has been linked to various health problems in humans including insulin resistance, obesity, diabetes, non-alcoholic liver diseases, and even cancer. …”
    Get full text
    Article
  16. 16

    A Novel Cryptography-Based Architecture for Secure Data Asset Sharing and Circulation Systems by Dongyu Yang, Yu Wang, Wentao Huang, Yue Zhao

    Published 2025-06-01
    “…Therefore, this paper establishes a security protection model of data assets in the whole life cycle with cryptography technology as the core, and designs a security technical framework that runs through each link of data asset sharing and circulation. In addition, an architecture design scheme of data asset security sharing and circulation system based on cryptography service technology is proposed, which can systematically solve the security problem of data asset sharing and circulation in uncontrolled environments, and can improve the ability of on-demand deployment, flexible access and dynamic adjustment while maximizing the security of data assets.…”
    Get full text
    Article
  17. 17

    Shared Decision-Making in Medications for Elderly Patients with Multi-Morbidities: A Phenomenological Study by Liu YD, Zhao H, Zhang CY, Zheng YJ, Hou JN, Yang JL, Liu XY

    Published 2025-07-01
    “…Healthcare professionals should continue to improve their shared decision-making awareness and ability, provide patients with targeted decision-making needs, solve decision-making problems, and promote the implementation of shared decision-making in elderly patients with multi-morbidities.Keywords: multi-morbidity, elderly, shared decision-making, medication, patients, stakeholders, qualitative research…”
    Get full text
    Article
  18. 18

    The effect of PBL integrated RMS on biological literacy and critical thinking ability of high school students by Khairotun Nihlah, Rizhal Hendi Ristanto, Tri Handayani Kurniati

    Published 2024-10-01
    “…This study aimed to determine the effect of Problem-Based Learning (PBL) integrated Reading, Mind Mapping, and Sharing (RMS) on biological literacy and critical thinking skills in biotechnology material. …”
    Get full text
    Article
  19. 19

    A hybrid differential evolution based on gaining‑sharing knowledge algorithm and harris hawks optimization. by Xuxu Zhong, Meijun Duan, Xiao Zhang, Peng Cheng

    Published 2021-01-01
    “…Differential evolution (DE) is favored by scholars for its simplicity and efficiency, but its ability to balance exploration and exploitation needs to be enhanced. …”
    Get full text
    Article
  20. 20

    Impact of Driver Age and Experience in Software Usage on Driving Safety and Usability of Car-Sharing Software by Chunhui Jing, Jinyi Zhi, Suixian Yang, Wei Wang

    Published 2021-01-01
    “…Car-sharing economy has caused new driving safety and usability problems, which have not been well studied. …”
    Get full text
    Article