Results 91 to 100 of about 10,337 (237)

Identity Based Generalized Signcryption Scheme in the Standard Model

open access: yesEntropy, 2017
Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting.
Xiaoqin Shen, Yang Ming, Jie Feng
doaj   +1 more source

A climate–habitat–network robustness framework reveals climate‐driven habitat shifts and corridor resilience for milu in China

open access: yesConservation Science and Practice, EarlyView.
Habitat fragmentation and climate change jointly threaten the persistence of wide‐ranging species, posing complex challenges for conservation planning. However, most current connectivity approaches overlook the integration of species‐specific constraints, climate‐driven dynamics, and quantitative robustness assessments. To bridge this gap, we propose a
Mengdi Fu   +3 more
wiley   +1 more source

Identity based authentication protocol for wireless sensor networks

open access: yesRevista Facultad de Ingeniería Universidad de Antioquia, 2013
In this work, a novel identity based authentication protocol for sensor networks is proposed, involving bilinear pairings over an elliptic curve point group, and message authentication codes, as main underlying components.
Moisés Salinas Rosales   +1 more
doaj  

An iterated greedy‐based metaheuristic with local search for the rank pricing problem

open access: yesInternational Transactions in Operational Research, EarlyView.
Abstract The rank pricing problem involves determining optimal prices for a set of products while accounting for customers' budgets and preferences. This study develops an iterated greedy‐based metaheuristic to efficiently solve this problem. The core idea is to generate a sequence of solutions by iteratively applying destruction and reconstruction ...
Herminia I. Calvete   +3 more
wiley   +1 more source

Do Fair Value Adjustments Excluded From Net Income Convey New Information That Is Complementary to GAAP Earnings?

open access: yesJournal of Business Finance &Accounting, EarlyView.
ABSTRACT We use banks’ quarterly fair value disclosures to perform the first short‐window event study of fair value adjustments excluded from net income and offer three main results. First, we find that fair value adjustments for banks’ loan portfolios are positively associated with short‐window stock returns and that they impact investors’ response to
John L. Campbell   +2 more
wiley   +1 more source

Biomechanical Assessment of Root Torque in Clear Aligners: Impact of Trimline Design, Engagers, and Pressure Points With Palatal Compensation Movement

open access: yesOrthodontics &Craniofacial Research, EarlyView.
ABSTRACT Background Root torque control is essential for guiding the proper movement of anterior teeth, primarily to prevent periodontal complications. This movement, in clear aligner therapy (CAT), requires precise force application to minimize unintended displacements.
Flavio Traversa, Gabriele Rossini
wiley   +1 more source

Covariance Structure Modeling of Engineering Demand Parameters in Cloud‐Based Seismic Analysis

open access: yesEarthquake Engineering &Structural Dynamics, Volume 55, Issue 7, Page 1533-1551, June 2026.
ABSTRACT Probabilistic seismic demand modeling aims to estimate structural demand as a function of ground motion intensity—a critical stage in seismic risk assessment. Although many models exist to describe the structural demand, few consider the covariance among engineering demand parameters, potentially overlooking a key factor in improving the ...
Archie Rudman   +3 more
wiley   +1 more source

Absolute Quantification of Brain Deuterium Metabolic Imaging in Healthy Volunteers and Glioblastoma Patients at 7T

open access: yesMagnetic Resonance in Medicine, Volume 95, Issue 6, Page 3077-3094, June 2026.
ABSTRACT Purpose We present a method for absolute quantification of deuterated metabolites in vivo at 7T. We describe acquisition protocols and an analysis pipeline compatible with 7T Terra MRIs. We apply them using a 2H/1H receive array in healthy volunteers and glioblastoma patients.
Jabrane Karkouri   +12 more
wiley   +1 more source

Twisted Wire Strands Under Coupled Bending and Torsion

open access: yesProceedings in Applied Mathematics and Mechanics, Volume 26, Issue 2, June 2026.
ABSTRACT Slender composite structures occur in automotive applications in different variations and on different size scales. They range from single conductors, which are composite structures themselves, to wiring harnesses, where another level of complexity is added by bundling several cables.
Muhannad Hawwash   +5 more
wiley   +1 more source

Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

open access: yesБезопасность информационных технологий, 2015
This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj  

Home - About - Disclaimer - Privacy