Showing 2,181 - 2,200 results of 4,347 for search '"Toleration"', query time: 0.06s Refine Results
  1. 2181

    Elliptic curve ElGamal encryption based location privacy-preserving scheme by Huibin LAI, Li XU, Yali ZENG, Rui ZHU

    Published 2020-06-01
    “…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
    Get full text
    Article
  2. 2182

    Significance of the heritage of the Great Duchy of Lithuania in popular interpretations of the national narrative by Irena Šutinienė

    Published 2008-08-01
    “…The significance of the interpretations of symbols and myths supporting civic-territorial dimensions of Lithuanian national identity increases as well: it is expressed in importance for contemporary identity of the values of tolerance, civic national identity, multiculturalism that are highlighted in popular interpretations. …”
    Get full text
    Article
  3. 2183

    Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking by Zhi-yuan LI, Ru-long CHEN, Ru-chuan WANG

    Published 2016-04-01
    “…Resource discovery in delay-tolerant mobile social networks (MSN) continues to be challenging issue. …”
    Get full text
    Article
  4. 2184

    The Experience of Being Obese and the Many Consequences of Stigma by Jane Ogden, Cecelia Clementi

    Published 2010-01-01
    “…The results are discussed in terms of the costs and benefits of stigma and a balance between support, tolerance, and collusion in promoting weight loss.…”
    Get full text
    Article
  5. 2185

    Detection of sybil attacks based on periodic ultra wide band distance information in WSN by Yanzhi ZHANG, Xiaoqin YE

    Published 2016-08-01
    “…Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.…”
    Get full text
    Article
  6. 2186

    Determination of production capacity for open-pit coal mines under uncertainty: A model based on economies of scale. by Shuai Wang, Bo Cao, Runcai Bai, Guangwei Liu

    Published 2025-01-01
    “…The application of the model is demonstrated through this case study, revealing that the uncertainties in production costs and coal prices are (-13.05%, +27.68%) and (-10.79%, +10.79%) respectively. Subsequently, risk-tolerant capacity planning recommendations are proposed, effectively mitigating the impact of uncertainties on production capacity determination.…”
    Get full text
    Article
  7. 2187

    A blockchain sharding scheme in edge computing by Jun WANG, Jianwei MA, Jinxi LUO

    Published 2023-12-01
    “…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
    Get full text
    Article
  8. 2188

    Inter-block 4-erasure-correcting coding scheme for real-time bulk data transfer by Gang CHEN, Jun-feng ZHU, Shi-le ZHANG, Bai-feng WU

    Published 2012-06-01
    “…Most of the existing erasure-correcting codes were limited by encoding/decoding complexities and encoded data size.They were not suitable for use in the real-time applications that orient bulk data based on blocks or packages.Therefore,a novel inter-block 4-erasure-correcting coding scheme for real-time bulk data transfer was presented.Based on single parity-check codes incorporated with the features of GF(2<sup>8</sup>)field in finite field,the present coding scheme could tolerate simultaneous failures of four blocks with only four redundancy blocks for a group of continuous data.Meanwhile,its encoding/decoding complexities had linear relationship with respect to the size of data blocks and it supported arbitrary size of data.Furthermore,it was proved to have MDS property,thus achieving optimal erasure-correcting capability with the same redundancy information.Theoretical and experimental analysis showed that the present coding scheme could code with 27 continuous data blocks at most.…”
    Get full text
    Article
  9. 2189

    PROVOST’S ADMINISTRATIVE SKILLS AND TEACHER’S JOB SATISFACTION IN SHEHU SHAGARI COLLEGE OF EDUCATION, SOKOTO STATE, NIGERIA by FODIO GARBA, FALMATA ABDULKARIM GALTIMARI

    Published 2024-12-01
    “…The study concluded that college Provost’s, human relation with teachers can be effectively maintained through conducive and enabling working environment with zero tolerance for nepotism and if sustain will result in the attainment of organizational goals and objectives, not only in the college but at all categories of our educational institutions. …”
    Get full text
    Article
  10. 2190

    Elusive modes of Foxp3 activity in versatile regulatory T cells by Minghong He, Yongqiang Feng

    Published 2025-01-01
    “…Foxp3-expressing CD4 regulatory T (Treg) cells play a crucial role in suppressing autoimmunity, tolerating food antigens and commensal microbiota, and maintaining tissue integrity. …”
    Get full text
    Article
  11. 2191

    Trust management scheme for driver-vehicle separation on dual-layer blockchain by ZHANG Haibo, HUANG Honglong, LI Fangwei, XU Yongjun

    Published 2024-11-01
    “…Additionally, the adaptive size-practical Byzantine fault tolerance (AS-PBFT) consensus algorithm was designed to optimize the consensus scale and reduce consensus time. …”
    Get full text
    Article
  12. 2192

    DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer by Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao

    Published 2024-01-01
    “…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. The security of our approach is analyzed by building a generalized stochastic coloring petri net (GSCPN) model of DHRCA. …”
    Get full text
    Article
  13. 2193

    Safety of proton pump inhibitors by Ye. A. Losik

    Published 2016-08-01
    “…Short term intake of PPI is well tolerated by patients and can rarely cause side effects. …”
    Get full text
    Article
  14. 2194

    Managing Bahiagrass in Hybrid Bermudagrass Pastures by Brent A. Sellers, Jason A. Ferrell

    Published 2005-10-01
    “…The popularity of bahiagrass in Florida can be attributed to its drought tolerance, low fertility requirements, and persistence even under heavy grazing. …”
    Get full text
    Article
  15. 2195

    STUDY ON THE STRESS DISTRIBUTION OF FASTENING BOLTS OFSTEAM TURBINE CYLINDER BASED ON FINITE ELEMENT ANALYSIS by LIU ChangFu, CAI WenHe, DAI XiaoHao, CHEN Xin, DONG ShuQing, DU ShuangMing, NING YuHeng

    Published 2019-01-01
    “…Considering the service condition of the bolts,the fracture of the bolts was mainly caused by the lack of safety tolerance and the additional stress.…”
    Get full text
    Article
  16. 2196

    Influence of Tooth Surface Geometry on Bending Fatigue Life of Face Gear by Yan Hongzhi, Wen Guangxu, Li Chao, Zhou Tengfei

    Published 2015-01-01
    “…Based on the coordinate transformation and meshing theory,the tooth surface equation of face gear is deduced.The finite element model of the different parameters(pressure angle,modulus)of face gear transmission is built,the influence of tooth face parameters on tooth root bending stresses,contact area and the distribution rule of bending stresses along the direction of tooth height and width are analyzed.Based on modified local stress-strain method,the fatigue crack initiation life in different roughness of grinding and milling tooth face is calculated.And the fatigue crack propagation life is predicted with damage tolerant design method.The results prove that the pressure angle has a great influence on the tooth face bending fatigue life,especially for the crack initiation life.A larger pressure angle is helpful to improve the tooth face bending fatigue comprehensive life.In addition,grinding method is more conducive to improve the tooth face bending fatigue life than milling method.This study provides a basis for the anti-fatigue design of face gear.…”
    Get full text
    Article
  17. 2197

    Traumatic Periprosthetic Acetabular Fracture Treated with One-Stage Exchange and Bone Reconstruction Using a Synthetic Bone Graft Substitute by Jan Svacina

    Published 2016-01-01
    “…The patient was encouraged to ambulate three days postoperatively weight-bearing as tolerated. At the one-year follow-up visit the patient was ambulatory and full weight-bearing without any walking aids. …”
    Get full text
    Article
  18. 2198

    Managing Mexican Petunia (Ruellia simplex C. Wright) in the Home Landscape by Carrie A. Reinhardt Adams, Christine Wiese, L. C. Lee, Sandra B. Wilson, A. M. Smith, Rosanna Freyre

    Published 2014-06-01
    “… Environmental tolerance, abundant seed production, and an ability to easily grow from plant stem sections have allowed Mexican petunia to spread into natural areas that border urban areas. …”
    Get full text
    Article
  19. 2199

    Kompetence za ekonomsko diplomacijo in mednarodno poslovanje; konvergenca ali divergenca? by Marjan Svetličič

    Published 2011-03-01
    “…Posebna pozornost je namenjena zvezi med notranjimi in mednarodnimi ekonomskimi odnosi, globalni naravnanosti, vlogi varnosti ter dolgoročnega planiranja ter toleranci do napak. Ugotavlja se, da so kompetence ekonomskih diplomatov malih držav razlikujejo od tistih iz velikih držav in da sta med ključnimi kompetencami radovednost in pripravljenost na spremembe. …”
    Get full text
    Article
  20. 2200

    Fatigue in chronic liver disease patients: prevalence, pathophysiology, and management by Artur Kośnik, Maciej Wójcicki

    Published 2022-03-01
    “…In CLD patients, fatigue manifests with both central symptoms, characterised by cognitive impairment, sleep disturbance, apathy, and autonomic dysfunction, and peripheral symptoms, characterised by decreased exercise tolerance and reduced physical activity levels. The pathogenesis of fatigue in CLD is multifactorial and involves changes in the brain–liver axis resulting from changes in inflammatory cytokines or the gut microbiome. …”
    Get full text
    Article