-
441
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article -
442
Adaptive Hierarchical Collocation Method for Solving Fractional Population Diffusion Model
Published 2023-01-01“…This paper presents an adaptive hierarchical collocation method for solving this model, enhancing the efficiency of algorithms based on Low-Complexity Shannon-Cosine wavelet derived from combinatorial identity theory. …”
Get full text
Article -
443
Multi-threshold algorithm about image segmentation based on polynomial uniform approximation
Published 2016-10-01“…Aiming at those shortcomings of previous multi-threshold image segmentation algorithm such as large complexity and instability caused by the image histogram glitch interference,a new multi-threshold image segmentation algorithm was proposed using Bernstein polynomial to uniformly approximate histogram curve.First,according to the approximation theory of Weierstrass to construct Bernstein polynomial for the histogram curve,then more difficult peak value calculating of the histogram was reduced to the Bernstein polynomial extremal generating,that was exported easily by the first and second derivative of Bernstein polynomial function,and finally obtain the actual peak value of the image histogram by picking up these extremes and polar values and filtering through classification algorithm,and finish multi-threshold image segmentation.Experimental results show that the algorithm is insensitive for histogram glitch interference,the overall is stable,the redundant computation and time complexity are smaller,with less time and high efficiency,the approximate performance and segmentation effect are better.…”
Get full text
Article -
444
Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback
Published 2022-02-01“…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
Get full text
Article -
445
Bounds on T T ¯ $$ T\overline{T} $$ deformation from entanglement
Published 2024-10-01Get full text
Article -
446
A Comprehensive Model and Numerical Study of Shear Flow in Compressible Viscous Micropolar Real Gases
Published 2024-12-01“…However, the finite-difference method offers advantages in speed, stability, and lower computational demands. This research bridges gaps in existing models and establishes a foundation for further investigations into complex flow phenomena in micropolar real gases.…”
Get full text
Article -
447
A Lightweight CNN-Transformer Implemented via Structural Re-Parameterization and Hybrid Attention for Remote Sensing Image Super-Resolution
Published 2024-12-01“…The proposed approach achieves SR reconstruction for remote sensing images with fewer parameters and less computational overhead than those of traditional transformers and high-performance CNN models. …”
Get full text
Article -
448
An Improved Deep Learning Model for Traffic Crash Prediction
Published 2018-01-01Get full text
Article -
449
A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems
Published 2017-01-01“…This paper focuses on the deadlock avoidance problem for systems of simple sequential processes with resources (S3PR) by using Petri nets structural analysis theory. Inspired by the one-step look-ahead DAP that is an established result, which is of polynomial complexity, for an S3PR without one-unit-capacity resources shared by two or more resource-transition circuits (in the Petri net model) that do not include each other, this research explores a multiple-step look-ahead deadlock avoidance policy for a system modeled with an S3PR that contains a shared one-unit-capacity resource in resource-transition circuits. …”
Get full text
Article -
450
Energy consumption optimization scheme in UAV-assisted MEC system based on optimal SIC order
Published 2024-02-01“…In uplink non-orthogonal multiple access (NOMA)-based unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, the successive interference cancellation (SIC) order of NOMA became a bottleneck limiting the transmission performance of task offload in uplink link.To reduce the energy consumption of the system, the SIC order was discussed and the optimal SIC order based on channel gain and task delay constraint was proposed.The optimization problem of minimizing the system energy consumption was proposed based on the optimal SIC order while satisfying the constraints of the given task delay of the device, the maximum transmit power constraint of the device, and the UAV trajectory.Since the problem was a complex non-convex problem, an alternating optimization method was adopted to solve the optimization problem to achieve power allocation and UAV trajectory optimization.A low-complexity algorithm based on matching theory was proposed to obtain the optimal device grouping in different time slots.Simulation results show that the optimal SIC order can realize smaller system energy consumption under the same task delay constraint compared with other SIC order, the proposed low-complexity device grouping algorithm can obtain the optimal device grouping.…”
Get full text
Article -
451
Trends in Language Formalization in Architecture
Published 2014-12-01“…This is the domain where the more recent advances in formal languages (such as discrete maths, theory of computation, logics, language theory, higher algebras, decision theory) have been applied more often and profoundly. …”
Get full text
Article -
452
Observer-Based Adaptive Neural Control of Quadrotor Unmanned Aerial Vehicles Subject to Model Uncertainties and External Disturbances
Published 2024-12-01“…A direct control approach is employed, significantly reducing computational complexity by minimizing the need for frequent online parameter updates while maintaining high tracking precision and robustness. …”
Get full text
Article -
453
Discovery of Staircase Chirality through the Design of Unnatural Amino Acid Derivatives
Published 2024-01-01“…Remarkably, one of the staircase molecules exhibits 4 distinct types of chirality: central, orientational, turbo, and staircase chirality, a combination that has not been previously documented in the literature. Computational studies using density functional theory (DFT) calculations were conducted to analyze the relative energies of individual staircase isomers, and the results are in agreement with our experimental findings. …”
Get full text
Article -
454
Vertex Coloring and Eulerian and Hamiltonian Paths of Delaunay Graphs Associated with Sensor Networks
Published 2024-12-01“…In this paper, we explore the connection between sensor networks and graph theory. Sensor networks represent distributed systems of interconnected devices that collect and transmit data, while graph theory provides a robust framework for modeling and analyzing complex networks. …”
Get full text
Article -
455
Hybrid Cryptosystem Using Polybius and Elgamal Algorithm Over the Gaussian Integers
Published 2024-01-01“… In composition theory, computer security, and engineering are all closely related fields under which cryptography, a technology that deals with data security, falls. …”
Get full text
Article -
456
Arsenate and Arsenite Reaction Kinetics with Ferric Hydroxides Using Quantum Chemical Calculations
Published 2018-10-01Get full text
Article -
457
-
458
Discovering Representations of Democracy in Big Data: Purposive Semantic Sample Selection for Qualitative and Mixed-Methods Research
Published 2024-11-01“…Our contribution includes validating this NLP approach for social sciences and humanities as well as providing a robust tool for researchers, facilitating deeper qualitative analysis and exploration of big data corpora within the computational grounded theory framework.…”
Get full text
Article -
459
A Bilevel Approach to the Facility Location Problem with Customer Preferences Under a Mill Pricing Policy
Published 2024-11-01“…This allows for a more accurate representation of customer preferences and the resulting decisions regarding facility location and pricing. To address the complexities of this model, we apply duality theory to the lower-level problems and, ultimately, reformulate the bilevel problem as a single-level mixed-integer optimization problem. …”
Get full text
Article -
460
Optimal dimensions of steel welded beams with hinged support units
Published 2023-11-01“…At the present time, the requirements to reliability and durability of steel structures, as well as their economic feasibility, are increasing. Considering the complexity of analyzing multiple factors influencing the strength, stability and durability of steel welded beams, a new approach to the determination of optimal dimensions based on maximum-strain-energy theory is proposed, with the derivation of new coefficients to simplify the selection of beam cross-sections.Materials and methods. …”
Get full text
Article