Results 31 to 40 of about 391,271 (301)

The OLCI Neural Network Swarm (ONNS): A Bio-Geo-Optical Algorithm for Open Ocean and Coastal Waters

open access: yesFrontiers in Marine Science, 2017
The processing scheme of a novel in-water algorithm for the retrieval of ocean color products from Sentinel-3 OLCI is introduced. The algorithm consists of several blended neural networks that are specialized for 13 different optical water classes. These
Martin Hieronymi   +3 more
doaj   +1 more source

Secure and {\sl Practical} Identity-Based Encryption [PDF]

open access: yes, 2005
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core   +1 more source

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Considerate constructors scheme: Glenfarg water treatment works [PDF]

open access: yesProceedings of the Institution of Civil Engineers - Engineering Sustainability, 2011
The project to modify Glenfarg water treatment works by Scottish Water, working in conjunction with its partners Black and Veatch Ltd and Scottish Water Solutions, received a gold award and ‘the ultimate accolade’ of ‘The Most Considerate Site 2009’ at the considerate constructors scheme (CCS) awards.
Murray, Michael   +2 more
openaire   +2 more sources

Water Corrosion Problems and Sustainability of Water Supply Schemes [PDF]

open access: yesInternational Journal of Current Science Research and Review, 2021
Water supply schemes should be technically and socially sustainable for smooth running, smooth operation and maintenances. Failure in either one of these leads to the whole system failure. Once the system is technically feasible, we can manage its social aspects.
openaire   +1 more source

NRASQ61R Expression in Lymphatic Endothelial Cells Causes Enlarged Vessels, Hemorrhagic Chylous Effusions, and High Mortality in a Mouse Model of Kaposiform Lymphangiomatosis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Kaposiform lymphangiomatosis (KLA) is an aggressive complex lymphatic anomaly. Patients exhibit malformed lymphatic vessels and often develop hemorrhagic effusions and elevated angiopoietin‐2 (Ang‐2) levels. A somatic NRAS p.Q61R (NRASQ61R) mutation has been associated with KLA.
C. Griffin McDaniel   +3 more
wiley   +1 more source

Integrated Zoning and Spatial Heterogeneity of Coastal Watershed-Nearshore Waters

open access: yesRemote Sensing, 2023
Integrated land-sea development and protection are important for the sustainable development of coastal areas. To promote the transition from separate land-sea management to integrated land-sea governance, the scientific delineation of the integrated ...
Pei Huang, Honghua Shi, Zongling Wang
doaj   +1 more source

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM

open access: yesFEBS Letters, EarlyView.
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley   +1 more source

Identity-based ring signature scheme under standard model

open access: yesTongxin xuebao, 2008
An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption.
ZHANG Yue-yu, LI Hui, WANG Yu-min
doaj   +2 more sources

Home - About - Disclaimer - Privacy