-
441
Novel adaptive generalized principal component analysis algorithm based on Hebbian rule
Published 2020-07-01“…In order to adaptively estimate the generalized principal component from input signals,a novel generalized principal component analysis algorithm was proposed based on the Hebbian linear neuron model.Since the autocorrelation matrices of the signals were estimated directly from the sampled data at the current time,the proposed algorithm had low computation complexity.Trough analyzing all of the equilibrium points by Lyapunov method,it is proven that if and only if the weight vector in the neuron had the same direction with the generalized principal component,the proposed algorithm attains the convergence status.Simulation results shows that compared with some same type algorithms,the proposed algorithm has faster convergence speed.…”
Get full text
Article -
442
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
443
E-health-based nutrition education effect for improving result measurement of hedonic hunger, dietary energy density, and body mass index in overweight and obese adult women
Published 2025-01-01“…Lifestyle change interventions through improved eating behaviour and physical activity have proven to be effective in addressing obesity. This study aims to analyse the effect of E-health-based nutrition education on improving result measurement of hedonic hunger, dietary energy density, and Body Mass Index (BMI) in overweight and obese adult women. …”
Get full text
Article -
444
Serious gaming for digital growth. Reducing waste through the Lean mindset
Published 2022-12-01“…The Lean approach leverages proven strategies to increase the quality of the production process. …”
Get full text
Article -
445
Fault Tolerant Control of Internal Faults in Wind Turbine: Case Study of Gearbox Efficiency Decrease
Published 2018-01-01“…The convergence of the method is proven with respect to the rotor parameters and its effectiveness is evaluated through the rotor speed.…”
Get full text
Article -
446
Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks
Published 2015-08-01“…An attacking scheme was proposed against the permutation-based multi-polynomial scheme proposed by Guo,et al for pair-wise key establishment in wireless sensor networks.Attacks on polynomials were carried out by constructing a black-box to integrally solve the set of polynomials rather than a single polynomial.The results show that this scheme can break the symmetric polynomials and make the permutation of polynomials lose its function.The proven theorems and instance analysis indicate that the scheme proposed by Guo,et al can’t frustrate the large-scale node capture attack and can’t break the tolerance threshold of polynomials.Therefore,the scheme is insecure.…”
Get full text
Article -
447
Characterization of Extremal Unicyclic Graphs Using F-Coindex
Published 2021-01-01“…The study of forgotten index and coindex for the molecular structures of some special chemical graphs (compounds and drugs) has proven significant in medical and pharmaceutical drug design fields by making reliable statistical conclusion about biological properties of new chemical compounds and drugs. …”
Get full text
Article -
448
Provable data possession scheme with authentication
Published 2016-10-01“…To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.…”
Get full text
Article -
449
Midazolam nasal spray to treat intermittent, stereotypic episodes of frequent seizure activity: pharmacology and clinical role, a comprehensive review
Published 2022-10-01“…Many studies have indicated quick cessation of seizures with Nayzilam compared to rectal diazepam, which has been the standard of care treatment. Nayzilam has been proven to be safe and effective for acute seizures in children, deeming it a revolutionary alternative in times where intravenous administration is not possible.…”
Get full text
Article -
450
Qualitative results and numerical approximations of the $ (k, \psi) $-Caputo proportional fractional differential equations and applications to blood alcohol levels model
Published 2024-12-01“…The existence and uniqueness results were proven utilizing the fixed point theory of Banach's and Leray-Schauder's types. …”
Get full text
Article -
451
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01“…The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.…”
Get full text
Article -
452
New trends in the treatment of androgenetic alopecia
Published 2025-01-01“…However, treatments with proven efficacy approved by recognised organisations and associations are limited, and research is ongoing to discover new drugs, redesign existing ones and establish therapy algorithms. …”
Get full text
Article -
453
Physical and Chemical Modifications of Plant Fibres for Reinforcement in Cementitious Composites
Published 2019-01-01“…Fibres that undergo chemical and physical modifications had been proven to exhibit improved fibre-matrix interfacial adhesion in the composite and contribute to better composite mechanical properties. …”
Get full text
Article -
454
Quality and safety requirements for pharmacy-based vaccination in resource-limited countries
Published 2025-02-01“…Abstract Pharmacy-based vaccination (PBV) programs have proven to be a promising strategy for improving vaccination coverage, particularly in resource-limited countries. …”
Get full text
Article -
455
Secrecy capacity analysis of MISO system with artificial noise
Published 2012-10-01“…Adding artificial noise in the MISO system was an effective method to improve the security.The transmit power allocation and artificial noise generation was mainly discussed.An artificial noise model of MISO system was presented,in which the artificial noise was regarded as additive channel noise.It was proven that when the artificial noise was distributed on Gaussian distribution,the secrecy capacity of MISO system was maximized,and the expression of this secrecy capacity was deduced.Considering the transmit power constraint and using the vector space projection method,The optimum power allocation is obtained.Given a power allocation,the artificial noise is generated by Box-Muller transformation,which was distributed on Gaussian distribution.And with the vector projection method,the artificial noise meets the optimum power allocation.…”
Get full text
Article -
456
Access control model and its application for collaborative information systems
Published 2008-01-01“…The authorization decision on resources is the major problem in collaborative information systems.Firstly,the term "action" was defined based on roles,temporal states and environmental states,and the action-based access control(ABAC) model was presented.Then,the access control mechanism based on ABAC for collaborative information sys-tems was introduced.The security association was defined and its producing procedure was proposed,which contains security properties such as user request,user identity,password,role,temporal state,environmental state and lifetime.Finally,to exchange the security properties among user,action server and resources management server,a secure authen-tication protocol was proposed,and its security was proven under the universally composable model.…”
Get full text
Article -
457
A Guide to Tracking Physical Activity
Published 2016-08-01“…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
Get full text
Article -
458
The role of silicon in suppressing gray leaf spot development in St. Augustinegrass
Published 2003-12-01“…Augustinegrass (Stenotaphrum secundatum) in Florida, its possible that gray leaf spot, caused by the fungus Magnaporthe grisea (Pyricularia grisea), will be a problem in your lawn or sod field. Research has proven the effectiveness of amendments of silicon (Si) to soils that are deficient in soluble Si (<25 mg/L) for control of diseases on a number of hosts including rice and sugarcane, which are regularly fertilized with Si in south Florida. …”
Get full text
Article -
459
The role of silicon in suppressing gray leaf spot development in St. Augustinegrass
Published 2003-12-01“…Augustinegrass (Stenotaphrum secundatum) in Florida, its possible that gray leaf spot, caused by the fungus Magnaporthe grisea (Pyricularia grisea), will be a problem in your lawn or sod field. Research has proven the effectiveness of amendments of silicon (Si) to soils that are deficient in soluble Si (<25 mg/L) for control of diseases on a number of hosts including rice and sugarcane, which are regularly fertilized with Si in south Florida. …”
Get full text
Article -
460
A Guide to Tracking Physical Activity
Published 2016-08-01“…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
Get full text
Article