Results 71 to 80 of about 10,337 (237)
COBASE: A new copula‐based shuffling method for ensemble weather forecast postprocessing
We propose COBASE, a novel copula‐based postprocessing methododology that combines the strengths of multivariate parametric correction with non‐parametric rank‐based approaches. We consider two case studies for multi‐site temperature in Austria and multi‐site temperature and dew‐point temperature in the Netherlands.
Maurits Flos +4 more
wiley +1 more source
Security analysis and improvement of a certificateless signcryption scheme
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj +2 more sources
Algebras of Variable Coefficient Quantized Differential Operators
In the framework of (vector valued) quantized holomorphic functions defined on non-commutative spaces, ``quantized hermitian symmetric spaces'', we analyze what the algebras of quantized differential operators with variable coefficients should be.
Jakobsen, Hans Plesner
core
Bivariate postprocessing of wind vectors
We introduce three novel bivariate postprocessing approaches and analyze their performance for joint postprocessing of bivariate wind‐vector components in Germany. Bivariate vine‐copula‐based models, a bivariate gradient‐boosted version of ensemble model output statistics (EMOS), and a bivariate distributional regression network (DRN) are compared with
Ferdinand Buchner +3 more
wiley +1 more source
Threshold ring signature for wireless sensor networks
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the ...
Jun-fang XIAO, Jian LIAO, Gui-hua ZENG
doaj +2 more sources
Pairing Optimizations for Isogeny-Based Cryptosystems
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj +1 more source
Evaluation of prestress losses in concrete beams using destructive and non‐destructive methods
Abstract Over the past few decades, prestressing techniques have become essential in the construction of key structures, infrastructure, and bridges. The serviceability and safety of prestressed concrete (PC) elements are closely tied to the effectiveness of the prestressing process.
A. N. Consiglio, G. Muciaccia, G. Rosati
wiley +1 more source
Climate change drives shifts in suitable habitats for Eurasian lynx and its prey (hare, roe deer) in Mohe, Daxing'anling Mountains. Under RCP scenarios, moderate warming (RCP4.5) promotes substantial habitat expansion, while high‐emission conditions (RCP8.5) lead to strong expansion in the 2050s but slower gains and partial contraction by the 2070s ...
Binglian Liu +5 more
wiley +1 more source
Chosen-Ciphertext Secure Unidirectional Proxy Re-Encryption Based on Asymmetric Pairings
Proxy re-encryption (PRE) is a cryptographic primitive that extends public key encryption by allowing ciphertexts to be re-encrypted from one user to another without revealing information about the underlying plaintext. This makes it an essential privacy-
Benjamin Zengin +3 more
doaj +1 more source
ABSTRACT Accurate identification of broadband oscillation types is a prerequisite for implementing appropriate control strategies. The strongly nonlinear, nonstationary and multi‐modal characteristics of broadband oscillation signals impose higher demands on identification methods. Practical applications face challenges such as coupling effects between
Jinduo Yang +7 more
wiley +1 more source

