Showing 521 - 540 results of 2,686 for search '"provenance"', query time: 0.07s Refine Results
  1. 521

    Provably secure secret sharing scheme based on bilinear maps by LI Hui-xian1, PANG Liao-jun2

    Published 2008-01-01
    “…A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the public key cryptosystems.Then,a new secret sharing scheme based on the bilinear maps is pro-posed,with its correctness,security and performance analyzed and proven subsequently.Compared with the existing schemes,the proposed scheme is provably secure.At the same time,the proposed scheme departs the private key compu-tation of participants from the secret distribution process and the dealer does not have to securely save each participant’s private key,which makes this scheme more secure and more efficient.Therefore,the proposed scheme is more applicable than the existing ones.…”
    Get full text
    Article
  2. 522

    History and Actual State of Non-HEU Fission-Based Mo-99 Production with Low-Performance Research Reactors by S. Dittrich

    Published 2013-01-01
    “…Besides this original process, two further and actually proven processes are suitable as well and recommended for small-scale LEU fission Mo-99 production also. …”
    Get full text
    Article
  3. 523

    Spectral Element Method for Fractional Klein–Gordon Equations Using Interpolating Scaling Functions by Haifa Bin Jebreen

    Published 2023-01-01
    “…The method’s convergence is proven, and some illustrative examples confirm it. …”
    Get full text
    Article
  4. 524

    The Utilization of a Fish Pump for Harvesting Shrimp from Tanks and Ponds by Cortney L. Ohs, Scott W. Grabe, R. LeRoy Creswell

    Published 2006-05-01
    “…Recently, modified mechanical pumps have proven to be very effective at harvesting shrimp from ponds and raceways. …”
    Get full text
    Article
  5. 525

    Optimal Algorithms and the BFGS Updating Techniques for Solving Unconstrained Nonlinear Minimization Problems by Chein-Shan Liu

    Published 2014-01-01
    “…An invariant manifold defined for the model problem in terms of a locally quadratic function is used to derive a purely iterative algorithm and the convergence is proven. Then, the rank-two updating techniques of BFGS are employed, which result in several novel algorithms as being faster than the steepest descent method (SDM) and the variable metric method (DFP). …”
    Get full text
    Article
  6. 526

    An Unusual Inverted Talar Neck Fracture–Dislocation by Brent Kokubun, Motasem Refaat

    Published 2022-01-01
    “…Hawkins classification, later modified by Canale, is the gold standard method of describing talar neck fractures by the degree of dislocation. It has proven to be clinically relevant in predicting risk of osteonecrosis. …”
    Get full text
    Article
  7. 527

    Gamma Knife Radiosurgery for Acromegaly by John D. Rolston, Lewis S. Blevins

    Published 2012-01-01
    “…Stereotactic radiosurgery, and in particular Gamma Knife surgery (GKS), has proven to be an effective noninvasive adjunct to traditional treatments, leading to disease remission in a substantial proportion of patients. …”
    Get full text
    Article
  8. 528

    River Contour Recognition and Extraction Algorithm Based on Kirsch Operator and Multi-level Threshold Segmentation by ZHOU Shaojun, SHE Hailong

    Published 2023-01-01
    “…The intelligent extraction accuracy of river contour from high-resolution remote sensing images under complex backgrounds is low.Thus,a method of combining the Kirsch operator with threshold segmentation is proposed to preprocess and pre-segment the gray images.Then,according to the morphological characteristics of the river,the image is morphologically processed to remove most of the background noise.Finally,the second threshold segmentation is conducted on the main area to realize accurate river contour recognition and extraction.The applicability of this method is proven by recognizing river samples in different terrain conditions.By employing objective evaluation indexes,the recognition accuracy of river area is verified to exceed 90%,which is much higher than the simple threshold segmentation method.This meets the needs of high-precision river channel extraction and provides references for intelligent and rapid extraction of river channel information.…”
    Get full text
    Article
  9. 529

    HSV-1 Encephalitis in an Elderly Man Receiving Ibrutinib for Waldenstrom’s Macroglobulinemia by Mark R. Wallace

    Published 2020-01-01
    “…Though ibrutinib has proven to be a revolutionary new small molecule agent, and has relatively minimal toxicity as compared to traditional chemotherapy, infections have emerged as a major complication of therapy. …”
    Get full text
    Article
  10. 530

    Measuring and analysing standardisation in the Hungarian hotel sector by Petra Gyurácz-Németh

    Published 2018-01-01
    “…The results show that the level of hotel standardisation depends on the hotel chain membership but only weakly by 5%. There are also proven significant relationships with the Hotelstars Union membership, the number of rooms and the star rating of the hotels…”
    Get full text
    Article
  11. 531

    Is Our Food Safe from Pesticides? by Frederick M. Fishel

    Published 2013-03-01
    “…The agricultural community typically will use pesticides sparingly as part of the IPM strategy whenever proven alternatives are not available for pest control. …”
    Get full text
    Article
  12. 532

    Resource allocation algorithm based on non-cooperative game theory in uplink OFDMA multi-hop relay networks by Zheng XIANG, Xu-ming FANG, Peng XU

    Published 2012-03-01
    “…Resource allocation issue in uplink OFDMA multi-hop relay networks was investigated.Firstly,with constraints such as maximum transmission power being imposed,a multi-cell optimization model for resource allocation in uplink OFDMA multi-hop relay networks was formulated.By applying non-cooperative game and pricing theories,the optimization is transformed into the case where power was independently allocated on each sub-channel.The existence and uniqueness of Nash equilibrium for power allocation model which was based on non-cooperative was proven,and accordingly a distributed algorithm was proposed.Simulation results show that,the proposed algorithm can improve the system throughput effectively while profoundly reducing total system transmission power,thus achieving much higher energy efficiency ratio.…”
    Get full text
    Article
  13. 533

    Discriminant Analysis of Undaria pinnatifida Production Areas Using Trace Elemental Analysis by Mikio Kaihara

    Published 2010-01-01
    “…As an example of testing in another marine product, near-infrared spectra (NIR) and trace elemental analysis of U. pinnatifida are proven effective methods for discriminating production centers by us and Food and Agricultural Materials Inspection Center (FAMIC). …”
    Get full text
    Article
  14. 534

    Meconium aspiration syndrome: An overview of the literature by Hueng-Chuen Fan, Chuan-Mu Chen

    Published 2024-01-01
    “…For example, in both vigorous and nonvigorous neonates with MSAF, routine endotracheal suctioning during resuscitation is not recommended. There is no proven therapy for MAS; therefore, management is primarily supportive. …”
    Get full text
    Article
  15. 535

    Identity-based cloud storage integrity checking from lattices by Miaomiao TIAN, Chuang GAO, Jie CHEN

    Published 2019-04-01
    “…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
    Get full text
    Article
  16. 536

    Is Our Food Safe from Pesticides? by Frederick M. Fishel

    Published 2013-03-01
    “…The agricultural community typically will use pesticides sparingly as part of the IPM strategy whenever proven alternatives are not available for pest control. …”
    Get full text
    Article
  17. 537

    Isokinetic Testing: Why it is More Important Today than Ever by Kevin E Wilk, Christopher A Arrigo, George J Davies

    Published 2024-04-01
    “…Isokinetics is a proven method to train and objectively assess the capability of muscle groups, particularly at the knee. …”
    Get full text
    Article
  18. 538

    Benefit of Probiotics on Cardiovascular Health- A Narrative Review by Ashna Mathur, Sofia Malik, Latha Ganti

    Published 2024-10-01
    “…Still, more research needs to be done on the safety and considerations of administering probiotics and their underlying mechanisms since the evidence is predominantly experimental. Probiotics have proven to be a valuable research point given the urgency and incidence rates of coronary artery disease.…”
    Get full text
    Article
  19. 539

    On Equilibrium Problem for T-Shape Elastic Structure by Alexander Khludnev

    Published 2025-01-01
    “…The existence of a solution to the considered problems is proven. A sufficient and necessary condition imposed onto the external forces for the solvability of the problems is found. …”
    Get full text
    Article
  20. 540

    Conformal η-Ricci-Yamabe Solitons within the Framework of ϵ-LP-Sasakian 3-Manifolds by Abdul Haseeb, Meraj Ali Khan

    Published 2022-01-01
    “…In the present note, we study ϵ-LP-Sasakian 3-manifolds M3ϵ whose metrics are conformal η-Ricci-Yamabe solitons (in short, CERYS), and it is proven that if an M3ϵ with a constant scalar curvature admits a CERYS, then £Uζ is orthogonal to ζ if and only if Λ−ϵσ=−2ϵl+mr/2+1/2p+2/3. …”
    Get full text
    Article