Results 141 to 150 of about 10,318 (256)
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems. [PDF]
Yu Q.
europepmc +1 more source
ABSTRACT This paper presents the development and validation of a scalable platooning system based on the predecessor‐following (PF) topology, designed for low‐cost follower platforms. It integrates key technologies such as localization, path planning, profile generation, and low‐level control to create a practical solution.
Dongwoo Seo, Jinhee Lee, Jaeyoung Kang
wiley +1 more source
Privacy-Preserving Multi-User Graph Intersection Scheme for Wireless Communications in Cloud-Assisted Internet of Things. [PDF]
Yang S.
europepmc +1 more source
Abstract Temperature is a key variable in alpine regions such as the Tianshan Mountains, which affects the population and economic development in lowlands by regulating the melting of snow and glaciers. The climate change over the Tianshan Mountains may have a strong climate impact.
Wen‐Jie Zhang +5 more
wiley +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones. [PDF]
Su Y +5 more
europepmc +1 more source
Anthropogenic Exacerbation of Global High‐Risk Compound Hot–Dry Events Over the Past Century
Abstract As climate warms, the compound hot–dry events (CHDEs) have become more frequent across most regions of the globe, bringing serious threats to both the human population and the natural environment in affected areas. In the study, a copula‐based probability index (PI) is used to explore variations in risk indicators associated with global and ...
Zizhen Dong +7 more
wiley +1 more source
Scalable privacy-preserving data analytics for IoMT via FHE and zk-SNARK-enabled edge aggregation. [PDF]
Ben Othman S, Mihret N.
europepmc +1 more source
Abstract Bathymetry is a critical input to storm surge models on coastlines fronted by lagoon systems, yet few studies explore how variations in bathymetry influence flood impacts, flooded extent, and exposed population across these globally widespread morphologies.
Zaid Al‐Attabi +8 more
wiley +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
Abstract Existing comparative studies on conceptual hydrological model structures have generally focused on streamflow, with less attention to evapotranspiration (ET). Yet, appropriate ET representation in conceptual models is crucial for obtaining reliable hydrological simulations, especially under climate change and in ungauged basins.
Shuyue Wu +4 more
wiley +1 more source

