Multi-criteria decision-analysis (MCDA) methods have been widely applied by many researchers in various fields of study. One of the numerous MCDA methods, the Technique for Order Preference by Similarity to Ideal Solu...
详细信息
Multi-criteria decision-analysis (MCDA) methods have been widely applied by many researchers in various fields of study. One of the numerous MCDA methods, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) under fuzzy environment, namely fuzzy TOPSIS, has been successfully applied in many practical, real-world challenges. This paper provides a short review of fuzzy TOPSIS applications. The research is based on 25 studies conducted in the years 2009 - 2018. Most relevant and most cited papers concerned with fuzzy TOPSIS technique were analyzed and categorized into application areas, such as supply chain, environment, energy sources, business, healthcare. Fuzzy TOPSIS implementations are examined and compared by approaches used, such as fuzzy sets, hesitant fuzzy sets or intuitionistic fuzzy sets, by other methods combined with fuzzy TOPSIS, such as fuzzy Analytic Hierarchic Process (AHP) or enhancements for group decision-making and by a number of alternatives and criteria used. Finally, insights into ongoing trends, most popular approaches, and directions of study concerning the fuzzy TOPSIS method are presented.
The importance of thermal radiation and Stefan blowing on the boundary layer flow of tetra hybrid nanofluid flow across a disk are examined in the present work employing the Cattaneo-Christov flux model. Additionally,...
详细信息
The importance of thermal radiation and Stefan blowing on the boundary layer flow of tetra hybrid nanofluid flow across a disk are examined in the present work employing the Cattaneo-Christov flux model. Additionally, the Marangoni convection effect and Stefan blowing are examined. Tetra-hybrid nanofluids are employed in sophisticated thermal systems like heat exchangers, solar energy systems, and cooling technologies because of their improved thermal conductivity and heat transmission properties. Under microgravity conditions, a surface tension differential in the plasma causes the intriguing scientific phenomenon known as Marangoni convection. Important uses of the Marangoni effect include welding, convection or Bernard cells, crystal growth, electron beam melting of metals, soap film stability, and more. In order to improve heat exchangers in chemical processes, optimize thermal management in power plants, and provide effective cooling systems for intricate machinery, the model is essential. Furthermore, it is a flexible tool for contemporary engineering solutions that advance sustainable practices by improving the energy efficiency of renewable technologies. To solve the problem, the Homotopy analysis approach is applied, and graphs are used to show the analytical outcomes. The temperature and velocity fields rise as the Stefan blowing parameter rises, while the solutal profile falls.
BACKGROUND AND OBJECTIVE:Compression therapy is extensively used for the treatment of venous deficiency and edema in the lower limb. The applied compression improves fluid circulation, which reduces the interstitial f...
详细信息
BACKGROUND AND OBJECTIVE:Compression therapy is extensively used for the treatment of venous deficiency and edema in the lower limb. The applied compression improves fluid circulation, which reduces the interstitial fluid accumulation. However, the effect of compression garments on soft tissues is poorly understood due to the high variability among the patients. With the long-term goal of designing patient-specific compression therapy, this study aims to develop a real-time simulation tool, able to predict the mechanical response of soft tissues of the lower limb under compression.
methods:For such purpose, the use of standard Finite Element Analysis (FEA) falls short, as typically large numerical models needed for such simulations imply high computational cost. For this purpose, a solution based on Reduced Order Modeling (ROM) is developed to compute, in real-time, the mechanical effects of compression therapy. More specifically, this work focuses on the geometrical parametrization of lower limbs and the definition of the ROM through an adaptive sampling, which reduces the computational cost of the offline stage.
RESULTS:The implemented ROM reduces the dimensionality of the problem, which enables to carry out simulation in real time (online stage). Moreover, the proposed adaptive-sampling method offers an acceptable trade-off between computational cost and accuracy on the offline stage. Once the ROM is developed, it is used to perform a sensitivity analysis, which gives a detailed insight on the mechanical effects in the soft tissues of the lower limb.
CONCLUSION:The proposed methodology to develop ROM of the lower limb serves as a valuable numerical tool to foresee the effects of the compression therapy on the lower limb.
We explore the use of residual networks for argumentation mining, with an emphasis on link prediction. The method we propose makes no assumptions on document or argument structure. We evaluate it on a challenging data...
The identity-based signcryption scheme combines the advantages of the signcryption scheme and the identity-based cryption scheme, which has high calculation and communication efficiency and easy key management. In ord...
The identity-based signcryption scheme combines the advantages of the signcryption scheme and the identity-based cryption scheme, which has high calculation and communication efficiency and easy key management. In order to effectively solve the problems of high latency and data information privacy during the secure transmission of drone data to cloud servers, we propose an identity-based proxy signcryption scheme that supports outsourcing decryption and member revocation. The complex bilinear pairing calculation is outsourced to the cloud server to reduce the user's computing overhead. When an illegal user wants to access the data, the illegal user's identity value ID will be put into the revocation list and the update private key algorithm is executed to generate an update password for the unrevoked user Key, revoked users lose the ability to decrypt because they cannot obtain the updated key that matches them. The identity-based signcryption scheme protected by the proxy can satisfy unforgeability and forward security. Finally, the comparison results show that this solution is superior to previous work in terms of function and calculation time.
Nowadays, the application prospect of cloud storage is more and more extensive, and the security problem of cloud storage has become one of the hotspots of research. Searchable encryption can make full use of the huge...
Nowadays, the application prospect of cloud storage is more and more extensive, and the security problem of cloud storage has become one of the hotspots of research. Searchable encryption can make full use of the huge computing resources of cloud servers and solve the problem of secure search after data encryption and upload. However, the existing searchable encryption schemes have the problems of high computational cost, low security, and insufficient flexibility in the way of searching keywords. In order to solve these problems, we propose a new certificateless multi-user fuzzy keyword searchable encryption scheme, which introduces the key distribution center, effectively reduces the computational cost, solves the problem of certificate management and key escrow, and uses the optimized wildcard technology to realize the fuzzy search of multiple users, which is not only brings convenience to users, but also realizes flexible search methods. Finally, the analysis results show that our scheme has indistinguishable security under keyword guessing attacks. Simulation experiments and performance analysis results show that our scheme has higher computational efficiency.
This paper is devoted to combining ecology challenges and STEM technologies. We consider ecology as an integral part of STEM process. The including of ecology in the STEM allows not only to develop mathematician calcu...
This paper is devoted to combining ecology challenges and STEM technologies. We consider ecology as an integral part of STEM process. The including of ecology in the STEM allows not only to develop mathematician calculations and engineering skills but also forms students' ecological consciousness. The attempt to combine ecology and STEM is aimed to make the knowledge in ecological sphere more practical. STEM education can help in solving the main ecological problems and challenges. STEM lessons, projects, conferences, exchanges could explain and give a living example of damages caused to our planet by irrational using of natural resources. It can improve public awareness and show the careful attitude to our planet.
In the cloud storage environment, how to efficiently and dynamically complete the integrity verification of multi-user and multi-replica data is a challenging problem. Based on the bilinear mapping signature mechanism...
In the cloud storage environment, how to efficiently and dynamically complete the integrity verification of multi-user and multi-replica data is a challenging problem. Based on the bilinear mapping signature mechanism and the multi-branch authentication tree, we propose an identity-based integrity verification scheme of multi-replica data for cloud, which solves the problem of large public key storage and management overhead in signature algorithm based on traditional public key cryptosystems. The proof shows that our scheme satisfies the robustness and has the function of protecting privacy. The results of analysis indicate that, compared with the existing similar schemes, our scheme has higher communication efficiency and computing performance.
The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis of patients and the development of medical institutions. However, due to the privacy and sensitivity of medical...
The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis of patients and the development of medical institutions. However, due to the privacy and sensitivity of medical data, it is easy to cause security issues such as difficulty in data sharing among different medical institutions and easy leakage of data privacy. Because the blockchain has the characteristics of non-tampering, anonymity, and decentralization. We propose a blockchain-based searchable proxy re-encryption scheme for EHR security storage and sharing. First, we use blockchain and cloud server to store encrypted EHR together to prevent EHR from being tampered with and leaked. Secondly, we use a certificateless encryption and proxy re-encryption based on identity and type scheme as a data sharing protocol. Meanwhile, searchable encryption technology is used to generate a keyword index. Moreover, the proxy node is selected by the delegated proof-of-stake (DPOS) consensus algorithm, which ensures the privacy, immutability and security. It realizes the safe access of third-party data users to medical health data. Finally, security analysis and evaluation show that our scheme can resist identity disguise and replay attacks. In addition, it has stronger security and higher efficiency.
Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a re...
详细信息
Multimedia data have become popularly transmitted content in opportunistic networks. A large amount of video data easily leads to a low delivery ratio. Breaking up these big data into small pieces or fragments is a reasonable option. The size of the fragments is critical to transmission efficiency and should be adaptable to the communication capability of a network. We propose a novel communication capacity calculation model of opportunistic network based on the classical random direction mobile model, define the restrain facts model of overhead, and present an optimal fragment size algorithm. We also design and evaluate the methods and algorithms with video data fragments disseminated in a simulated environment. Experiment results verified the effectiveness of the network capability and the optimal fragment methods.
暂无评论