Results 21 to 30 of about 4,580,925 (281)
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong +3 more
doaj +1 more source
This study examines the definition of shared leadership and how to measure it. Research so far defines shared leadership as possessing some basic common characteristics. However, the aggregation approach and the social network approach, which have different characteristics, coexist in terms of measurement methods.
Hidenori Sato, Takahiko Makabe
openaire +3 more sources
Fluid model for a network operating under a fair bandwidth-sharing policy
We consider a model of Internet congestion control that represents the randomly varying number of flows present in a network where bandwidth is shared fairly between document transfers.
A Fair +3 more
core +5 more sources
Impact of removing OPTN region from vascularized composite allograft allocation
On 6/18/2020, the Organ Procurement and Transplantation Network (OPTN) implemented new policy replacing OPTN region with a 500 nautical mile (NM) circle around the donor hospital for the purpose of vascularized composite allograft (VCA) allocation.
Sarah E. Booker +7 more
doaj +1 more source
Application of trehalose ameliorates heat stress and promotes recovery of winter wheat seedlings
Trehalose was supplied to wheat (Triticum aestivum L.) seedlings just before a high temperature (40 °C) treatment and some physiological parameters were measured during the heat stress and recovery.
Y. Luo, Y. M. Gao, W. Wang, C. J. Zou
doaj +1 more source
Hardware Trojans in Chips: A Survey for Detection and Prevention
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs.
Chen Dong +5 more
doaj +1 more source
Vascularized composite allograft deceased donation in the United States
Vascularized composite allograft (VCA) transplantation represents a significant advancement in reconstructive surgery and offers hope to individuals who experienced congenital disorders or severe tissue injuries to restore physical appearance, function ...
Wida S. Cherikh +7 more
doaj +1 more source
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel +20 more
core +4 more sources
Background. The allocation of a limited supply of donor organs remains a critical challenge for organ transplantation. The analytical tools that policymakers rely upon for improving allocation policy have seen little advancement since the introduction of
Elijah Pivo, PhD(c) +8 more
doaj +1 more source
SCMDOT: Spatial Clustering with Multiple Density-Ordered Trees
With the rapid explosion of information based on location, spatial clustering plays an increasingly significant role in this day and age as an important technique in geographical data analysis.
Xiaozhu Wu, Hong Jiang, Chongcheng Chen
doaj +1 more source

