Results 51 to 60 of about 30,832 (233)

Deformable Attention Multiscale Feature Fusion Network‐Dehaze: An Adaptive Image Dehazing Method Based on Deformable Attention Multiscale Fusion Network

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents the deformable attention multiscale feature fusion network‐dehaze adaptive image dehazing network, which integrates three core modules (revised residual shrinkage unit, multiscale attention, cross‐scale feature fusion). It incorporates deformable convolution and multiscale attention mechanisms to address the detail loss issue of ...
Ruipeng Wang   +4 more
wiley   +1 more source

Efficient and secure pairing-free certificateless directed signature scheme

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
In an ordinary signature scheme any one can verify the validity of a signature produced by the signer. But public verifiability of signatures is not desirable in some applications where the signed message is sensitive to the signature receiver, for ...
Gayathri Nemani Bhagya   +3 more
doaj   +1 more source

Invariant Measure and Universality of the 2D Yang–Mills Langevin Dynamic

open access: yesCommunications on Pure and Applied Mathematics, EarlyView.
ABSTRACT We prove that the Yang–Mills (YM) measure for the trivial principal bundle over the two‐dimensional torus, with any connected, compact structure group, is invariant for the associated renormalised Langevin dynamic. Our argument relies on a combination of regularity structures, lattice gauge‐fixing and Bourgain's method for invariant measures ...
Ilya Chevyrev, Hao Shen
wiley   +1 more source

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Symmetric bilinear forms and vertices in characteristic 2 [PDF]

open access: yes, 2016
Let $G$ be a finite group and let $k$ be an algebraically closed field of characteristic $2$ and let $M$ be an indecomposable $kG$-module which affords a non-degenerate $G$-invariant symmetric bilinear form.
Murray, John C.
core   +1 more source

Stability Evaluation and Parametric Optimization of Coal‐Concrete Composite Bearing Systems Under Mine‐Water‐Induced Deterioration: Experiments and FEINN Analysis

open access: yesEnergy Science &Engineering, EarlyView.
Mine‐water immersion tests reveal pronounced coal weakening (vs. minor concrete degradation), identifying coal pillars as the stability‐limiting component in composite dams. A coupled FEINN framework quantifies extreme‐pressure stability and ranks multi‐parameter designs via a normalized multi‐indicator scheme, enabling optimized dam configuration for ...
He Wen   +6 more
wiley   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Threshold Password-Based Authentication Using Bilinear Pairings [PDF]

open access: yes, 2004
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private key from remote servers with knowledge of only his identity and password. He does not need to carry the smart card storing his private information.
Lee, S Lee, Sangwon   +4 more
openaire   +2 more sources

Solar Geoengineering Effects on Malaria Transmission Risk in South Asia Under G6sulfur Scenario

open access: yesInternational Journal of Climatology, EarlyView.
Comparison of EIR (unit: No of infected bites per person per day) for each considered country in South Asia, under the considered scenarios, averaged over the period 2020–2090. A regression equation is shown for each country (for Bhutan EIRG = 0.1690 × 10−10 EIRS + 0.5968 × 10−12) to illustrate the projected trend.
Athar Hussain   +2 more
wiley   +1 more source

Verifiable access control scheme based on unpaired CP-ABE in fog computing

open access: yesTongxin xuebao, 2021
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj   +2 more sources

Home - About - Disclaimer - Privacy