Results 161 to 170 of about 10,318 (256)
GeoCross: A Privacy-Preserving and Fine-Grained Authorization Scheme for Cross-Chain Geological Data Sharing. [PDF]
Lin L, Feng B, Jing P.
europepmc +1 more source
Abstract We count and give a parametrization of connected components in the space of flags transverse to a given transverse pair in every flag varieties of SO0(p,q)$\operatorname{SO}_0(p,q)$. We compute the effect the involution of the unipotent radical has on those components and, using methods of Dey–Greenberg–Riestenberg, we show that for certain ...
Clarence Kineider, Roméo Troubat
wiley +1 more source
A hybrid blockchain-based solution for secure sharing of electronic medical record data. [PDF]
Han G, Ma Y, Zhang Z, Wang Y.
europepmc +1 more source
Osculating geometry and higher‐order distance Loci
Abstract We discuss the problem of optimizing the distance function from a given point, subject to polynomial constraints. A key algebraic invariant that governs its complexity is the Euclidean distance degree, which pertains to first‐order tangency. We focus on the data locus of points possessing at least one critical point of the distance function ...
Sandra Di Rocco +2 more
wiley +1 more source
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments. [PDF]
Wang C, Wu H, Gan Y, Zhang R, Ma M.
europepmc +1 more source
Toral symmetries of collapsed ancient solutions to the homogeneous Ricci flow
Abstract Collapsed ancient solutions to the homogeneous Ricci flow on compact manifolds occur only on the total space of principal torus bundles. Under an algebraic assumption that guarantees flowing through diagonal metrics and a tameness assumption on the collapsing directions, we prove that such solutions have additional symmetries, that is, they ...
Anusha M. Krishnan +2 more
wiley +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
ABSTRACT We investigate an optimization problem that arises when working within the paradigm of Data‐Driven Computational Mechanics. In the context of the diffusion‐reaction problem, such an optimization problem seeks the continuous primal fields (gradient and flux) that are closest to some predefined discrete fields taken from a material data set. The
Pedro B. Bazon +3 more
wiley +1 more source
Energy efficient trust aware secure routing algorithm with attribute based encryption for wireless sensor networks. [PDF]
Selvi M +3 more
europepmc +1 more source
ABSTRACT Wave propagation effects such as resonance and interference effects complicate the design of many acoustic devices, particularly when the dimensions of the device are in the order of the operating wavelength. At the same time, these complications also offer an opportunity for numerical optimization schemes to outperform designs achieved using ...
Martin Berggren +4 more
wiley +1 more source

