Results 91 to 100 of about 74,008 (307)

An Efficient Key Management Scheme for Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
Wireless sensor networks (WSNs) can be used in a wide range of environments. Due to the inherent characteristics of wireless communications, WSNs are more vulnerable to be attacked than conventional networks.
Dahai Du, Huagang Xiong, Hailiang Wang
doaj   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Modular Arithmetic Based on Boolean Functions: A Divide and Conquer Approach

open access: yesIEEE Access
This paper introduces a new method for designing modular arithmetic units, for reduction ( $X (mod\ P)$ ), multiplication ( $(A\cdot B) (mod\ P)$ ), and multiplication by a constant ( $(constant\cdot A)(mod \ P)$ ).
Danila Gorodecky, Leonel Sousa
doaj   +1 more source

Modularity of generating series of divisors on unitary Shimura varieties II: arithmetic applications [PDF]

open access: green, 2017
Jan Hendrik Bruinier   +4 more
openalex   +1 more source

Stability Evaluation and Parametric Optimization of Coal‐Concrete Composite Bearing Systems Under Mine‐Water‐Induced Deterioration: Experiments and FEINN Analysis

open access: yesEnergy Science &Engineering, EarlyView.
Mine‐water immersion tests reveal pronounced coal weakening (vs. minor concrete degradation), identifying coal pillars as the stability‐limiting component in composite dams. A coupled FEINN framework quantifies extreme‐pressure stability and ranks multi‐parameter designs via a normalized multi‐indicator scheme, enabling optimized dam configuration for ...
He Wen   +6 more
wiley   +1 more source

Analysis of algorithms performing basic arithmetic operations in the quadratic RNS

open access: yesНаука. Инновации. Технологии, 2022
In this paper we explore the question of representing complex numbers in a residue number system and build algorithms for the operations of addition and multiplication. The idea of the construction of such systems is in determining how the set of complex
Lyudmila Borisovna Kopytkova
doaj  

A Synergistic Strategy for Data‐Constrained Deep Learning in Materials Science

open access: yesMaterials Genome Engineering Advances, EarlyView.
This work develops a three‐stage machine learning framework for materials property prediction, integrating data preparation, graph‐based model training, and final property inference. By synergistically integrating attention pooling, multi‐task learning, auxiliary tasks, and classification‐corrected regression, this hybrid framework provide a ...
Chun Ting Shao   +6 more
wiley   +1 more source

A PLP‐SEC Investigation of Di(Ethylene Glycol) Methyl Ether Methacrylate Radical Polymerization Propagation Kinetics in Solution

open access: yesMacromolecular Reaction Engineering, EarlyView.
The propagation rate coefficient of di(ethylene glycol) methyl ether methacrylate exhibits the same temperature dependency but is a factor of 12 higher in aqueous solution compared to bulk. Smaller increases are observed in ethanol and ethanol/water mixtures, with the value of the rate coefficient decreasing as the monomer concentration in solution is ...
Fatemeh Salarhosseini   +1 more
wiley   +1 more source

Method for Performing a Decoding Operation in a Threshold Mrma Cryptosystem of Secret Separation with Masking Transformation

open access: yesНаука. Инновации. Технологии, 2022
Introduction: the article proposes a new method for recovering a spatially shared secret within the threshold principle based on sets of partial secrets belonging to subscriber groups, the number of which is limited from below by a specified threshold ...
A. A. Kolyada   +2 more
doaj  

Home - About - Disclaimer - Privacy