Results 91 to 100 of about 4,491,165 (327)

Economic and Technical Assessment of Wind Potential Using SARIMAX Time Series Models: Wind Speed Forecasting and Analysis

open access: yesEnergy Science &Engineering, EarlyView.
The wind energy potential of Khaf was evaluated for 2025 using 15 years of wind data combined with advanced forecasting models, SARIMAX and Prophet. This integrated framework enables precise estimation of wind power density and optimal turbine selection, paving the way for the efficient and sustainable development of wind farms in the region.
Mohammad Amin Valizadeh   +3 more
wiley   +1 more source

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments

open access: yesIEEE Access, 2018
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang   +3 more
doaj   +1 more source

A New Certificateless Aggregate Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
On the basis of the certificateless short signature,this paper proposes a certificateless aggregate signature scheme in resource constrained environment.A signature protocol is initiated by the specified aggregator.The state information including random ...
CAO Suzhen,DAI Wenjie,SUN Han,WANG Xiuya
doaj   +1 more source

A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley   +1 more source

Universally Composable Verifiable Random Oracles

open access: yes, 2022
Random Oracles werden häufig in der Kryptographie eingesetzt um sehr effiziente Instanziierungen mächtiger kryptographischer Primitive zu konstruieren. Jedoch ist diese Praxis im Allgemeinen nicht zulässig wie verschiedene Nicht-Instanziierungs-Ergebnisse für Random Oracles mittels lokal berechenbarer Familien von Funktionen durch Halevi et al.
openaire   +3 more sources

Between Consistency and Adaptation: How Middle Managers Shape Compensation System Implementation

open access: yesHuman Resource Management, EarlyView.
ABSTRACT The success of a human resource management (HRM) system or subsystem, such as a compensation system, hinges on its implementation—yet the microfoundations of this process remain underexplored. To address this gap, we conducted two studies. Study 1 surveyed middle managers and employees in six organizations to examine their attributions of ...
Aino Tenhiälä   +3 more
wiley   +1 more source

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

open access: yesIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +1 more source

An average-case depth hierarchy theorem for Boolean circuits

open access: yes, 2015
We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of $\mathsf{AND}$, $\mathsf{OR}$, and $\mathsf{NOT}$ gates.
Rossman, Benjamin   +2 more
core   +1 more source

On independent random oracles

open access: yesTheoretical Computer Science, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Tumor‐Intrinsic Forkhead Box A2 Regulates the Lymph Node Metastasis of Papillary Thyroid Carcinoma by Regulating T‐Cell Apoptosis

open access: yesiLABMED, EarlyView.
We identified FOXA2 as a key regulator of lymph node metastasis in thyroid cancer, which controls cancer cell aggressiveness. FOXA2 knockdown promotes metastasis by enhancing tumor cell migration and, importantly, by inducing T‐cell apoptosis through a CCL2/LCN2‐mediated pathway. Created with BioGDP.com.
Ping Yang   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy