Results 1 to 10 of about 2,456,516 (297)
Technology and practice of CO2 capture and storage from Yanchang Petroleum
Through the innovative combination of CO2 capture in the coal chemical industry and oil reservoir CO2 storage, Yanchang Petroleum has realized multiple benefits such as clean utilization of coal, carbon emission reduction, and crude oil production ...
Xiangzeng WANG +7 more
doaj +1 more source
To mitigate problems such as injection water channeling, abrupt water breakthrough, rapid decline in oil production accompanied by an abrupt rise in water cut, and poor mobilization of matrix oil that commonly arise in low-permeability fractured ...
Shize Yin +3 more
doaj +1 more source
Key Backup and Recovery for Resilient DID Environment
This paper delves into the advantages of authentication algorithms employing self-sovereign identity, highlighting a reduced communication overhead and the elimination of single points of failure.
Jihwan Kim +3 more
doaj +1 more source
The effect of temperature on pyrolysis products during oil shale thermal decomposition
This study systematically investigates the effect of temperature on product distribution and reaction mechanisms during the pyrolysis of oil shale through thermogravimetric analysis (TG) and fixed-bed pyrolysis experiments.
Fajun Zhao +5 more
doaj +1 more source
Post tsunami recovery capacity gaps in Sri Lanka [PDF]
Poor response capacity has been identified as a major inhibitor for successful post tsunami recovery attempts in Sri Lanka. Despite level of incentives aid and help which have been received from the international communities, both governmental and ...
Amaratunga, Dilanthi +2 more
core
Combinatorial Penalties: Which structures are preserved by convex relaxations? [PDF]
We consider the homogeneous and the non-homogeneous convex relaxations for combinatorial penalty functions defined on support sets. Our study identifies key differences in the tightness of the resulting relaxations through the notion of the lower ...
Bach, Francis +2 more
core +1 more source
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
We consider a one-time digital signature scheme recently proposed by Persichetti and show that a successful key recovery attack can be mounted with limited complexity.
Baldi, Marco +2 more
core +1 more source
Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. [PDF]
Kim T, Kim W, Seo D, Lee I.
europepmc +1 more source
Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life. A key requirement is to minimize the amount of data transferred among nodes when recovering the lost or unavailable data of failed ...
Lee, Patrick P. C. +2 more
core +1 more source
Rebuilding Household Wealth: Implications for Economic Recovery [PDF]
[Excerpt] Congress was an active participant in the policy responses to the 2007-2009 recession and its aftermath and has an ongoing interest in macro-economic conditions.
Elwell, Craig K
core +2 more sources

