Results 201 to 210 of about 24,925 (334)
The rock failure mode is significantly influenced by the contributing factors, such as the joint inclination, the initial confining pressure, and the unloading point. We found six typical rock failure modes after a large number of numerical tests. Abstract Excavation unloading damages rock masses, with preferential failure along geological defects in ...
Fei Liu +4 more
wiley +1 more source
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance. [PDF]
Mutlaq KA +6 more
europepmc +1 more source
Elliptic curves and their applications in cryptography
Michael Paul Pemberton
openalex +1 more source
Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
Rekha, Rajeev Kumar Gupta
openalex +1 more source
This study investigates ground subsidence during tunnel excavation in karst areas, highlighting the combined effects of karst cave proximity, cave size, and soil spatial variability. Findings suggest that shorter cave distances and larger cave sizes increase subsidence variability, and a modified Peck formula is proposed for more accurate subsidence ...
Zhenghong Su +4 more
wiley +1 more source
Abstract Background To understand cellular morphology, biologists have relied on traditional optical microscopy of tissues combined with tissue clearing protocols to image structures deep within tissues. Unfortunately, these protocols often struggle to retain cell boundary markers, especially at high enough resolutions necessary for precise cell ...
Sam C. P. Norris +2 more
wiley +1 more source
Arithmetic Units for the Elliptic Curve Cryptography with Concurrent Error Detection Capability
Arash Hariri
openalex +1 more source
AN ACCESS CONTROL PROTOCOL FOR CLOUD DATA USING SECURED HYPER ELLIPTIC CURVE CRYPTOGRAPHY. [PDF]
S. Sharmila Deva Selvi, M. Gobi
openalex +1 more source

