-
21
ApproximateSecret Sharing in Field of Real Numbers
Published 2025-07-01“…In the era of big data, the security of information encryption systems has garnered extensive attention, particularly in critical domains such as financial transactions and medical data management. While traditional Shamir’s Secret Sharing (SSS) ensures secure integer sharing through threshold cryptography, it exhibits inherent limitations when applied to floating-point domains and high-precision numerical scenarios. …”
Get full text
Article -
22
Layout Optimization of Campus Bike-Sharing Parking Spots
Published 2020-01-01“…An optimization model of the layout of campus bike-sharing parking spots with travel time and construction cost as the optimization goal is established, and the branch and bound algorithm is used to solve the model. …”
Get full text
Article -
23
-
24
Enhancing SRM Performance through Multi-Platform Optimization and FPGA-Based Real-Time Simulation
Published 2024-10-01“…This paper proposes a multi-platform algorithm methodology in order to define firing angles of torque sharing functions (TSFs) for the indirect torque control of switched reluctance motors (SRM) through a hardware-in-the-loop (HIL) system. …”
Get full text
Article -
25
Spectrum Sharing Design for Integrated Aeronautical Communication and Radar System
Published 2025-03-01“…The novel framework of an integrated aeronautical communication and radar system (IACRS) to realize spectrum sharing is investigated. A non-orthogonal multiple access (NOMA)-motivated multi-input–multi-output (MIMO) scheme is proposed for the dual-function system, which is able to detect multiple aircraft while simultaneously transmitting dedicated messages. …”
Get full text
Article -
26
Relocation Optimization for Shared Electric Vehicles: A Literature Review
Published 2025-02-01“…The paper finally provides some interesting future research topics, such as considering the nonlinear charging process of electric vehicles in the process of constructing relocation optimization models and designing algorithms for shared electric vehicles.…”
Get full text
Article -
27
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…Such distributed resources are not used in the most effective way when only used individually, as sharing them provides even greater cost savings. Energy Peer-to-Peer (P2P) systems have thus been shown to be beneficial for prosumers and consumers through reductions in energy cost while also being attractive to grid or service providers. …”
Get full text
Article -
28
Scheduling Algorithm: Tasks Scheduling Algorithm for Multiple Processors with Dynamic Reassignment
Published 2008-01-01Get full text
Article -
29
Sharing and Specificity of Co-expression Networks across 35 Human Tissues.
Published 2015-05-01“…To address this problem, we infer tissue-specific gene co-expression networks for 35 tissues in the GTEx dataset using a novel algorithm, GNAT, that uses a hierarchy of tissues to share data between related tissues. …”
Get full text
Article -
30
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Published 2025-04-01“…This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
Get full text
Article -
31
Factors influencing docked bike-sharing usage in the City of Kigali, Rwanda
Published 2025-12-01“…Researchers conducted numerous studies to examine the usage of bike-sharing systems. While earlier research has highlighted the benefits of bike-sharing, limited attention has been given to changes in docked bike-share systems and the use of machine learning algorithms to predict docked bike-sharing usage. …”
Get full text
Article -
32
AI-Supported Shared Decision-Making (AI-SDM): Conceptual Framework
Published 2025-08-01“…To bridge this gap, we introduce artificial intelligence–supported shared decision-making (AI-SDM), a conceptual framework designed to integrate AI-based reasoning into shared decision-making to enhance care quality while preserving patient autonomy. …”
Get full text
Article -
33
A Shared Control Method of Multiobjective Motion Fusion for Surgical Robot
Published 2025-07-01“…Shared control combines human intelligence with autonomous algorithms, demonstrating potential for enhancing the intricate and dynamic operational capabilities of robots. …”
Get full text
Article -
34
Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization
Published 2025-01-01“…Next-generation sequencing (NGS) technology creates repositories of sequenced data from individuals’ raw genomic data, which raises challenges related to data ownership, management, and secure sharing. In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
Get full text
Article -
35
Call Admission Control Based on Resource Sharing in LTE-Advanced Relay System
Published 2014-02-01“…A call admission control based on resource sharing in LTE-Advanced relay system was proposed.If the shared resources of the target site for new users and handover users are used up,handover users can use the reserved r esources of the target site for handover users to access system,while new users can access system by resource sharing between the sites in the cell which the target site inside.Simulation results show that compared the proposed algorithm with LTE-Advanced system on fixed bandwidth reservation scheme and LTE-Advanced relay system on fixed bandwidth reservation scheme,the proposed algorithm can effectively reduce the blocking probability of new users and dropping probability of handover users in the cell,and can improve the system resource utilization.…”
Get full text
Article -
36
Improving data sharing and knowledge transfer via the Neuroelectrophysiology Analysis Ontology (NEAO)
Published 2025-05-01Get full text
Article -
37
Learning-based cooperative content caching and sharing for multi-layer vehicular networks
Published 2025-06-01“…Caching and sharing the content files are critical and fundamental for various future vehicular applications. …”
Get full text
Article -
38
Optimal scheduling of distributed shared energy storage based on optimal SOC interval
Published 2025-02-01“…The paper delves into the scheduling techniques for SES. While conventional day-ahead robust optimization algorithms specify ESS power output for each period, they struggle to adjust schedules due to time-dependent constraints like renewable energy output and ESS state limitations. …”
Get full text
Article -
39
Diagnostics of Cognitive Development in Children by Assessing Shared Intentionality in a Biotechnical System
Published 2022-09-01“…We analyze our own previous research, in which: 1) the goal was to measure the intellectual activity of a group while stimulating their shared intentionality; 2) the independent variable was the intellectual task; 3) the stimuli of shared intentionality were described. …”
Get full text
Article -
40
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
Get full text
Article