-
Chapter and Conference Paper
Compact Encryption Based on Module-NTRU Problems
The Module-NTRU problem, introduced by Cheon, Kim, Kim, Son (IACR ePrint 2019/1468), and Chuengsatiansup, Prest, Stehlé, Wallet, Xagawa (ASIACCS ’20), generalizes the versatile NTRU assumption. One of its main...
-
Chapter
Metabolomics of Tea Plants
Tea beverages have gained immense popularity globally as highly desirable non-alcoholic drinks, owing to their distinct flavor, enticing aroma, and wide range of health advantages. These desirable traits are p...
-
Chapter
Women Leadership in the Transcontinental Country: A Study in Turkey
Today’s professional environment is more diverse in terms of social, cultural, and ethnic dimensions than that in recent decades. The existing research has revealed that an organization’s innovation and proble...
-
Chapter and Conference Paper
A Novel Natural Language Processing Strategy to Improve Digital Accounting Classification Approach for Supplier Invoices ERP Transaction Process
Natural language processing (NLP) is a develo** field that offers increasing potential to simplify accounting-related tasks. This research studies a novel NLP approach to classify invoice categories based on...
-
Chapter and Conference Paper
Investment Optimization and Auxiliary Decision Support System of Power Grid Construction Project Under Double Carbon Target
Due to China’s novel coronavirus pneumonia and the deepening of the reform of the power grid market, the implementation and implementation of China’s dual carbon policy and the current international related qu...
-
Chapter and Conference Paper
A Generic Transform from Multi-round Interactive Proof to NIZK
We present a new generic transform that takes a multi-round interactive proof for the membership of a language \(\mathcal {L}\) ...
-
Chapter and Conference Paper
Finding Missing Security Operation Bugs via Program Slicing and Differential Check
The detection of missing security operations is a complex task in software engineering, mainly due to the semantic and contextual understanding required. Prior research efforts have employed similar path diffe...
-
Chapter
Characterization of Semi Amorphous Phase of Rice Husk Silica Reinforced AA7075 Aluminium Chips Based Matrix
Direct conversion process of recycling aluminium chip has recently been applied without the melting process to avoid the disadvantages of present method. Excellent recycling processes need to be focused to exp...
-
Chapter and Conference Paper
Method of Conjugate Vectors for the Analysis of Single-Phase-to-Ground-Faulted Grid
With the wide application of power electronic devices (PED), the characteristics of the grid fault vary greatly. The grid voltage/current exhibits the time-varying amplitude/frequency characteristics under asy...
-
Chapter and Conference Paper
See Finer, See More: Implicit Modality Alignment for Text-Based Person Retrieval
Text-based person retrieval aims to find the query person based on a textual description. The key is to learn a common latent space map** between visual-textual modalities. To achieve this goal, existing wor...
-
Chapter and Conference Paper
Considerations on Evaluation of Practical Cloud Data Protection
With the continuous growth of enterprises’ digital transformation, business-driven cloud computing has seen tremendous growth. The security community has proposed a large body of technical mechanisms, operatio...
-
Chapter
Peri-operative Management
Endoscopic sinus surgery (ESS) is accepted as the surgical management of the choice for chronic sinusitis or polyps. Recently the instruments and techniques have improved. The quality of the ESS has developed ...
-
Chapter and Conference Paper
Entropic Hardness of Module-LWE from Module-NTRU
The Module Learning With Errors problem ( ) has gained popularity in recent years for its security-efficiency balance,and its hardness has been established for a number of variants....
-
Chapter and Conference Paper
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU
In a so-called partial key exposure attack one obtains some information about the secret key, e.g. via some side-channel leakage. This information might be a fraction of the secret key bits (erasure mo...
-
Chapter and Conference Paper
The Impact of Artificial Intelligence on Work and Human Value: Views from Social Researchers
The rise of artificial intelligence (AI) and related new technologies have been widely discussed in recent years, especially on its benefits and threats to society. This study aims to explore the impact of AI ...
-
Chapter and Conference Paper
A Hybrid Convolutional Neural Network Based-Method for Brain Tumor Classification Using mMRI and WSI
In this paper, we propose a hybrid deep learning-based method for brain tumor classification using whole slide images (WSIs) and multimodal magnetic resonance image (mMRI). It comprises two methods: a WSI-bas...
-
Chapter and Conference Paper
Basic Model Design of Online Monitoring System for Mixed Radiation Field
With the wide application of nuclear technology, the radiation field shows more and more characteristics of hybrid, complexity and versatility. In order to ensure the safety and data transparency of radiation ...
-
Chapter and Conference Paper
Multi-ray Intelligent Monitoring System for Mixed Radiation Field Measurements
In certain special scenarios, there will be a mixed radiation field formed by a variety of nuclides or rays. The monitoring system for such radiation fields requires the capacity of comprehensive and automatic...
-
Chapter and Conference Paper
Research on Integrated Management Technology for Physical Protection System of Nuclear Facilities
In this work, the functional requirements of the integrated management of physical protection system has been studied, by analyzing the composition of the physical protection system, as well as the development...
-
Chapter and Conference Paper
The Teaching Reform of Information Security Specialty Driven by Innovative Practice Project Under the Background of Big Data
In the era of big data, the rapid development of information society and the application of Internet of Things, cloud computing and artificial intelligence have brought about changes in people’s lives. As we a...