-
261
Application of novel security technique in cloud environment using attribute dependent authentication for health care
Published 2025-07-01“…To achieve better key security, the Strong key dependent Subkey Generation Algorithm (SKSGA) is proposed. A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. …”
Get full text
Article -
262
Photovoltaic Power Forecasting with Weather Conditioned Attention Mechanism
Published 2025-04-01“…Notably, the attention modules adeptly learn patterns under diverse conditions, while simultaneously, the sharing of weights among the remaining components of the model effectively enhances prediction accuracy and facilitates a reduction in training time. …”
Get full text
Article -
263
Calibration Transfer of Soil Total Carbon and Total Nitrogen between Two Different Types of Soils Based on Visible-Near-Infrared Reflectance Spectroscopy
Published 2018-01-01“…The former could only be used for correction among instruments, while the latter fundamentally solved the problem of model sharing across different samples.…”
Get full text
Article -
264
Spectrum Efficient Mode Selection and Resource Allocation Optimization for D2D Communication in HetNet: A Multi-Agent Q-Learning Approach
Published 2024-01-01“…Second, a Multi-Agent Q-Learning (MAQL) algorithm is presented to assign the optimal channel for D2D pairs. …”
Get full text
Article -
265
Deployment and Operation of Battery Swapping Stations for Electric Two-Wheelers Based on Machine Learning
Published 2022-01-01“…With the rapid development of shared electric bicycles and takeaways, the scale of electric two-wheeler users is expanding while generating a huge demand for battery swapping. …”
Get full text
Article -
266
Limits on reliable information flows through stochastic populations.
Published 2018-06-01Get full text
Article -
267
Disturbance types play a key role in post-disturbance vegetation recovery in boreal forests of Northeast China
Published 2024-11-01“…Fire disturbance constituted the largest share at 49.4 % (SE = 0.4 %), followed by harvest disturbance at 45.3 % (SE = 0.4 %) and urbanization disturbance at 4.8 % (SE = 0.3 %). …”
Get full text
Article -
268
SVF: Support Vector Federation
Published 2025-01-01“…This study addresses and overcomes this limitation by proposing an innovative approach: instead of sharing weight vectors, we advocate sharing support vectors while safeguarding client data privacy through vector perturbation. …”
Get full text
Article -
269
Usage of short video applications (SVAs): Exploring Italian users’ social representations of short video creators and trust in informational and educational SVA content providers
Published 2025-05-01“…Trust is further shaped by communication skills, responsiveness, and the creator's willingness to create and share content. Lastly, algorithmic recommendations, user-friendly interfaces, and the accessibility of content are key factors that drive SVA usage. …”
Get full text
Article -
270
Model-Based Hardware-Software Codesign of ECT Digital Processing Unit
Published 2021-01-01“…Using MBD with the proposed segmented architecture, the system design can be flexibly tailored to the designer specifications to fulfill the required performance while meeting the resources constraint. In the linear-back projection image reconstruction algorithm, the segmentation scheme has exhibited high resource saving of 43% and 71% for a small degradation in a frame rate of 3% and 14%, respectively.…”
Get full text
Article -
271
Evaluative representations of the student audience in the context of current processes in Donbas: comparison of studies
Published 2025-01-01“…Accordingly, a dichotomy of opinions appears: some share the belief that Russia is a strong power with an independent path of development, while others see themselves as part of a European (global) civilization. …”
Get full text
Article -
272
Biased perceptions of public opinion don't define echo chambers but reveal systematic differences in political awareness.
Published 2025-01-01“…Echo chambers both feed and are fed by the false consensus effect, whereby people overestimate the degree to which others share their views, with algorithmic filtering of social media also a contributing factor. …”
Get full text
Article -
273
Communication resource allocation method in vehicular networks based on federated multi-agent deep reinforcement learning
Published 2025-08-01“…The simulation results show that the system spectrum efficiency is improved by 19.1% on average compared with the centralized DDPG, MADDPG, MAPPO and FL-DuelingDQN algorithms in the Vehicle Networking scenario, while the transmission success rate of the V2V link is improved by 9.3% on average, and the total capacity of the V2I link is increased by 16.1% on average.…”
Get full text
Article -
274
An Efficient Fine-Grained Access Control Scheme Based on Policy Protection in SGs
Published 2025-01-01“…With the rapid advancement of smart grid technology, data sharing between grid devices and between the grid and users has become increasingly frequent. …”
Get full text
Article -
275
Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization
Published 2025-08-01“…As data streams become increasingly prevalent across various sectors, preserving the privacy of sensitive information while maintaining data utility is a significant challenge. …”
Get full text
Article -
276
FLSH: A Framework Leveraging Similarity Hashing for Android Malware and Variant Detection
Published 2025-01-01“…As technology advances, the frequency and complexity of cyberattacks continue to rise, with Android OS, given its significant market share, becoming a prime target for sophisticated malware attacks. …”
Get full text
Article -
277
Predicting emergency department visits for non-traumatic dental-related conditions among Medicaid beneficiaries
Published 2025-06-01“…Abstract Patients who use the emergency department (ED) for non-traumatic dental-related conditions are likely to return for multiple visits, accounting for a disproportionate share of healthcare cost. Reliance on the ED for receiving dental care continues to rise, particularly among Medicaid beneficiaries. …”
Get full text
Article -
278
Innovative approaches in marketing for the development of the tourism industry
Published 2024-06-01“…For instance, AI-powered chatbots and virtual assistants provide real-time customer support, while machine learning algorithms analyze booking patterns to offer personalized travel recommendations. …”
Get full text
Article -
279
Enhancing Streamflow Prediction in Ungauged Basins Using a Nonlinear Knowledge‐Based Framework and Deep Learning
Published 2024-11-01“…The results reveal that the combination of clustering algorithms with the PCA method may lead to loss of information while the nonlinear method (UMAP) can extract more informative features. …”
Get full text
Article -
280
Balancing resource utilization and slice dissatisfaction through dynamic soft slicing for 6G wireless networks
Published 2025-07-01“…The problem is formulated as a Mixed Integer Linear Programming (MILP) model, aiming to maximize network utilization while minimizing slice dissatisfaction. Given the NP-hard nature of the problem, we propose the Heuristic Resource Allocation for Soft Slicing (HRASS) algorithm, which achieves near-optimal performance with significantly reduced computational complexity. …”
Get full text
Article