Results 91 to 100 of about 10,318 (256)

Representation of obligate groundwater‐dwelling copepod diversity in European protected areas

open access: yesConservation Biology, EarlyView.
Abstract Groundwaters sustain diverse surface ecosystems and are populated by metazoan species, mostly invertebrates, that provide fundamental ecological functions and are often of prominent conservation value due to narrow endemism and high phylogenetic rarity.
Francesco Cerasoli   +7 more
wiley   +1 more source

Identity based authentication protocol for wireless sensor networks

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
In this work, a novel identity based authentication protocol for sensor networks is proposed, involving bilinear pairings over an elliptic curve point group, and message authentication codes, as main underlying components.
Moisés Salinas Rosales   +1 more
doaj  

An iterated greedy‐based metaheuristic with local search for the rank pricing problem

open access: yesInternational Transactions in Operational Research, EarlyView.
Abstract The rank pricing problem involves determining optimal prices for a set of products while accounting for customers' budgets and preferences. This study develops an iterated greedy‐based metaheuristic to efficiently solve this problem. The core idea is to generate a sequence of solutions by iteratively applying destruction and reconstruction ...
Herminia I. Calvete   +3 more
wiley   +1 more source

Do Fair Value Adjustments Excluded From Net Income Convey New Information That Is Complementary to GAAP Earnings?

open access: yesJournal of Business Finance &Accounting, EarlyView.
ABSTRACT We use banks’ quarterly fair value disclosures to perform the first short‐window event study of fair value adjustments excluded from net income and offer three main results. First, we find that fair value adjustments for banks’ loan portfolios are positively associated with short‐window stock returns and that they impact investors’ response to
John L. Campbell   +2 more
wiley   +1 more source

Plating and double‐loop cerclage wiring improve the mechanical performance of the femoral stem after Zurich cementless total hip replacement in cats

open access: yesVeterinary Surgery, EarlyView.
Abstract Objective To compare the biomechanical performance of adjunctive locking plating and double‐loop cerclage wiring in feline femora implanted with Zurich cementless total hip replacement (THR) stems. Study design Cadaveric biomechanical study. Animals Paired femora (n = 32) from 16 feline cadavers.
Clair Park   +4 more
wiley   +1 more source

Degree theory for 4‐dimensional asymptotically conical gradient expanding solitons

open access: yesCommunications on Pure and Applied Mathematics, Volume 79, Issue 5, Page 1151-1298, May 2026.
Abstract We develop a new degree theory for 4‐dimensional, asymptotically conical gradient expanding solitons. Our theory implies the existence of gradient expanding solitons that are asymptotic to any given cone over S3$S^3$ with non‐negative scalar curvature. We also obtain a similar existence result for cones whose link is diffeomorphic to S3/Γ$S^3/\
Richard H. Bamler, Eric Chen
wiley   +1 more source

Efficient Energy‐Stable Discontinuous Galerkin Scheme for the Non‐Isothermal Cahn–Hilliard–Navier–Stokes Two‐Phase Fluid Flow System

open access: yesInternational Journal for Numerical Methods in Engineering, Volume 127, Issue 7, 15 April 2026.
ABSTRACT In this article, we propose a novel numerical framework for the non‐isothermal Cahn–Hilliard–Navier–Stokes two‐phase flow system, which couples the incompressible Navier–Stokes equations, the Cahn–Hilliard phase‐field equation, and the heat transport equation to capture temperature‐dependent two‐phase flow dynamics.
Guang‐An Zou   +4 more
wiley   +1 more source

Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

open access: yesБезопасность информационных технологий, 2015
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj  

Improved certificateless sequential multi-signature scheme

open access: yesTongxin xuebao, 2015
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

Why Is the Peak Group Analysis So Effective for IR Spectra Analysis?

open access: yesJournal of Chemometrics, Volume 40, Issue 4, April 2026.
ABSTRACT Peak group analysis (PGA), an MCR algorithm, has proven to be very successful in extracting pure component spectra and concentration profiles from IR and Raman spectral data when investigating carbonylation reactions with transition metal catalysts.
Klaus Neymeyr   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy