This study investigates ground subsidence during tunnel excavation in karst areas, highlighting the combined effects of karst cave proximity, cave size, and soil spatial variability. Findings suggest that shorter cave distances and larger cave sizes increase subsidence variability, and a modified Peck formula is proposed for more accurate subsidence ...
Zhenghong Su +4 more
wiley +1 more source
Abstract Background To understand cellular morphology, biologists have relied on traditional optical microscopy of tissues combined with tissue clearing protocols to image structures deep within tissues. Unfortunately, these protocols often struggle to retain cell boundary markers, especially at high enough resolutions necessary for precise cell ...
Sam C. P. Norris +2 more
wiley +1 more source
Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services. [PDF]
Awasthi C, Awasthi SP, Mishra PK.
europepmc +1 more source
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography. [PDF]
Xu G +6 more
europepmc +1 more source
Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns. [PDF]
Hu S, Zhang Y, Guo Y, Chen Y, Chen L.
europepmc +1 more source
Arithmetic Units for the Elliptic Curve Cryptography with Concurrent Error Detection Capability
Arash Hariri
openalex +1 more source
Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
Rekha, Rajeev Kumar Gupta
openalex +1 more source
The graphical abstract illustrates the calculated band gaps of AlZnCl3, AlZnBr3, AgZnCl3, and AgZnBr3 using GGA, m‐GGA, and HSE06 functionals. This comparison highlights the significant influence of the exchange–correlation functional on predicted electronic properties.
Mushfique Azad Takin +3 more
wiley +1 more source
Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN. [PDF]
D USR, R S, A B, D M, Pellakuri V.
europepmc +1 more source

