Showing 441 - 460 results of 2,686 for search '"provenance"', query time: 0.06s Refine Results
  1. 441

    Novel adaptive generalized principal component analysis algorithm based on Hebbian rule by Yingbin GAO, Xiangyu KONG, Qiaohua CUI, Haidi DONG

    Published 2020-07-01
    “…In order to adaptively estimate the generalized principal component from input signals,a novel generalized principal component analysis algorithm was proposed based on the Hebbian linear neuron model.Since the autocorrelation matrices of the signals were estimated directly from the sampled data at the current time,the proposed algorithm had low computation complexity.Trough analyzing all of the equilibrium points by Lyapunov method,it is proven that if and only if the weight vector in the neuron had the same direction with the generalized principal component,the proposed algorithm attains the convergence status.Simulation results shows that compared with some same type algorithms,the proposed algorithm has faster convergence speed.…”
    Get full text
    Article
  2. 442

    Secure communication mechanism for VSN based on certificateless signcryption by Wenbo ZHANG, Wenhua HUANG, Jingyu FENG

    Published 2021-07-01
    “…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
    Get full text
    Article
  3. 443

    E-health-based nutrition education effect for improving result measurement of hedonic hunger, dietary energy density, and body mass index in overweight and obese adult women by Rusyantia Anggun, Meliyanti Kusharto Clara, Pratomo Hadi

    Published 2025-01-01
    “…Lifestyle change interventions through improved eating behaviour and physical activity have proven to be effective in addressing obesity. This study aims to analyse the effect of E-health-based nutrition education on improving result measurement of hedonic hunger, dietary energy density, and Body Mass Index (BMI) in overweight and obese adult women. …”
    Get full text
    Article
  4. 444

    Serious gaming for digital growth. Reducing waste through the Lean mindset by Maria Antonietta Esposito, Filippo Bosi, Caterina Ferraro

    Published 2022-12-01
    “…The Lean approach leverages proven strategies to increase the quality of the production process. …”
    Get full text
    Article
  5. 445

    Fault Tolerant Control of Internal Faults in Wind Turbine: Case Study of Gearbox Efficiency Decrease by Younes Ait El Maati, Lhoussain El Bahir, Khalid Faitah

    Published 2018-01-01
    “…The convergence of the method is proven with respect to the rotor parameters and its effectiveness is evaluated through the rotor speed.…”
    Get full text
    Article
  6. 446

    Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks by Ai-wen WANG, Tao WEN, Yong ZHANG, Feng-mei ZHU, Di WU

    Published 2015-08-01
    “…An attacking scheme was proposed against the permutation-based multi-polynomial scheme proposed by Guo,et al for pair-wise key establishment in wireless sensor networks.Attacks on polynomials were carried out by constructing a black-box to integrally solve the set of polynomials rather than a single polynomial.The results show that this scheme can break the symmetric polynomials and make the permutation of polynomials lose its function.The proven theorems and instance analysis indicate that the scheme proposed by Guo,et al can’t frustrate the large-scale node capture attack and can’t break the tolerance threshold of polynomials.Therefore,the scheme is insecure.…”
    Get full text
    Article
  7. 447

    Characterization of Extremal Unicyclic Graphs Using F-Coindex by Muhammad Imran, Yasir Ali, Zainab Bibi, Muhammad Saad Ghafar

    Published 2021-01-01
    “…The study of forgotten index and coindex for the molecular structures of some special chemical graphs (compounds and drugs) has proven significant in medical and pharmaceutical drug design fields by making reliable statistical conclusion about biological properties of new chemical compounds and drugs. …”
    Get full text
    Article
  8. 448

    Provable data possession scheme with authentication by Hao-xing LI, Feng-hua LI, Cheng-gen SONG, Ya-long YAN

    Published 2016-10-01
    “…To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme could accomplish several issues with three interactions,including the possession proof of cloud data,the mutual authentication between user and cloud computing server,the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes,the proposed scheme has less computation and interactions,and better provable securities.In the random oracle model,the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.…”
    Get full text
    Article
  9. 449

    Midazolam nasal spray to treat intermittent, stereotypic episodes of frequent seizure activity: pharmacology and clinical role, a comprehensive review by Elyse M. Cornett, Meskerem A. Nemomsa, Bailey Turbeville, Matthew A. Busby, Jessica S. Kaye, Aaron J. Kaye, JooHee Choi, Giovanni F. Ramírez, Giustino Varrassi, Adam M. Kaye, Alan D. Kaye, James Wilson, Latha Ganti

    Published 2022-10-01
    “…Many studies have indicated quick cessation of seizures with Nayzilam compared to rectal diazepam, which has been the standard of care treatment. Nayzilam has been proven to be safe and effective for acute seizures in children, deeming it a revolutionary alternative in times where intravenous administration is not possible.…”
    Get full text
    Article
  10. 450
  11. 451

    ID-based efficient and proactive threshold proxy signature in the standard model by YU Yi-ke1, ZHENG Xue-feng2

    Published 2011-01-01
    “…The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.…”
    Get full text
    Article
  12. 452

    New trends in the treatment of androgenetic alopecia by Szymon Leonik, Michał Smoczok, Beata Bergler-Czop

    Published 2025-01-01
    “…However, treatments with proven efficacy approved by recognised organisations and associations are limited, and research is ongoing to discover new drugs, redesign existing ones and establish therapy algorithms. …”
    Get full text
    Article
  13. 453

    Physical and Chemical Modifications of Plant Fibres for Reinforcement in Cementitious Composites by R. Ahmad, R. Hamid, S. A. Osman

    Published 2019-01-01
    “…Fibres that undergo chemical and physical modifications had been proven to exhibit improved fibre-matrix interfacial adhesion in the composite and contribute to better composite mechanical properties. …”
    Get full text
    Article
  14. 454

    Quality and safety requirements for pharmacy-based vaccination in resource-limited countries by Kidanemariam G/Michael Beyene, Melaku Tileku Tamiru

    Published 2025-02-01
    “…Abstract Pharmacy-based vaccination (PBV) programs have proven to be a promising strategy for improving vaccination coverage, particularly in resource-limited countries. …”
    Get full text
    Article
  15. 455

    Secrecy capacity analysis of MISO system with artificial noise by Jiang JI, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    “…Adding artificial noise in the MISO system was an effective method to improve the security.The transmit power allocation and artificial noise generation was mainly discussed.An artificial noise model of MISO system was presented,in which the artificial noise was regarded as additive channel noise.It was proven that when the artificial noise was distributed on Gaussian distribution,the secrecy capacity of MISO system was maximized,and the expression of this secrecy capacity was deduced.Considering the transmit power constraint and using the vector space projection method,The optimum power allocation is obtained.Given a power allocation,the artificial noise is generated by Box-Muller transformation,which was distributed on Gaussian distribution.And with the vector projection method,the artificial noise meets the optimum power allocation.…”
    Get full text
    Article
  16. 456

    Access control model and its application for collaborative information systems by LI Feng-hua1, WANG Wei1, MA Jian-feng1, LIU Hong-yue1

    Published 2008-01-01
    “…The authorization decision on resources is the major problem in collaborative information systems.Firstly,the term "action" was defined based on roles,temporal states and environmental states,and the action-based access control(ABAC) model was presented.Then,the access control mechanism based on ABAC for collaborative information sys-tems was introduced.The security association was defined and its producing procedure was proposed,which contains security properties such as user request,user identity,password,role,temporal state,environmental state and lifetime.Finally,to exchange the security properties among user,action server and resources management server,a secure authen-tication protocol was proposed,and its security was proven under the universally composable model.…”
    Get full text
    Article
  17. 457

    A Guide to Tracking Physical Activity by Madison K. Keesling, Anne E. Mathews

    Published 2016-08-01
    “…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
    Get full text
    Article
  18. 458

    The role of silicon in suppressing gray leaf spot development in St. Augustinegrass by M. Brecht, Lawrence Datnoff, Russell Nagata, Thomas Kucharek

    Published 2003-12-01
    “…Augustinegrass (Stenotaphrum secundatum) in Florida, its possible that gray leaf spot, caused by the fungus Magnaporthe grisea (Pyricularia grisea), will be a problem in your lawn or sod field. Research has proven the effectiveness of amendments of silicon (Si) to soils that are deficient in soluble Si (<25 mg/L) for control of diseases on a number of hosts including rice and sugarcane, which are regularly fertilized with Si in south Florida. …”
    Get full text
    Article
  19. 459

    The role of silicon in suppressing gray leaf spot development in St. Augustinegrass by M. Brecht, Lawrence Datnoff, Russell Nagata, Thomas Kucharek

    Published 2003-12-01
    “…Augustinegrass (Stenotaphrum secundatum) in Florida, its possible that gray leaf spot, caused by the fungus Magnaporthe grisea (Pyricularia grisea), will be a problem in your lawn or sod field. Research has proven the effectiveness of amendments of silicon (Si) to soils that are deficient in soluble Si (<25 mg/L) for control of diseases on a number of hosts including rice and sugarcane, which are regularly fertilized with Si in south Florida. …”
    Get full text
    Article
  20. 460

    A Guide to Tracking Physical Activity by Madison K. Keesling, Anne E. Mathews

    Published 2016-08-01
    “…The Physical Activity Guidelines for Americans recommend that adults be purposefully active for at least 150 minutes per week for overall health and wellness. One proven strategy to make sure you reach your activity goal is to track your energy expenditure. …”
    Get full text
    Article