-
501
A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things
Published 2021-01-01“…” Besides, the formal proof we also compared the designed scheme with some existing solutions to show the cost-efficiency in terms of communication overhead and computation cost. …”
Get full text
Article -
502
Snowdrift‐Permitting Simulations of Seasonal Snowpack Processes Over Large Mountain Extents
Published 2024-08-01“…However, these spatial scales can be computationally intractable for large extents. In this work, the multiscale Canadian Hydrological Model (CHM) was applied to simulate snowpacks at snowdrift‐permitting scales (≈50 m) across the Canadian Cordillera and adjacent regions (1.37 million km2) forced by downscaled atmospheric data. …”
Get full text
Article -
503
A Systematic Approach for PLL-Based Zeta Power Converter Control
Published 2024-01-01Get full text
Article -
504
-
505
Ultra-Lightweight Collaborative SLAM for Robot Swarms
Published 2025-01-01“…Remarkably, we achieve a mapping accuracy below 30cm, a result comparable to high-end state-of-the-art solutions while reducing the cost, memory, and computation requirements by two orders of magnitude. …”
Get full text
Article -
506
Origins of the anomalous Hall conductivity in the symmetry enforced Fe3GeTe2 nodal-line ferromagnet
Published 2025-01-01“…Finally, our calculations suggest that electron doping could increase the AHC up to four times compared to its value at the computed Fermi level.…”
Get full text
Article -
507
Simulating and Verifying a 2D/3D Laser Line Sensor Measurement Algorithm on CAD Models and Real Objects
Published 2024-11-01“…This work not only reduces the need for physical prototyping, thereby contributing to sustainability, but also supports AI training by generating accurate synthetic data. …”
Get full text
Article -
508
Experimental validation of parked loads for a floating vertical axis wind turbine: wind–wave basin tests
Published 2025-07-01“…The datasets from this experimental work can serve as benchmarks for validating other computational parked load estimating tools, while the semi-numerical tool provides a way to gain insight into the unmeasurable quantities.…”
Get full text
Article -
509
Trench MOS Schottky Diodes: A Physics-Based Analytical Model Approach to Charge Sharing
Published 2025-01-01“…This work contributes to a valuable tool for TMBS device design, offering insights into electric field management that support high-efficiency, high-voltage applications, including power supplies, automotive electronics, and renewable energy systems.…”
Get full text
Article -
510
Using feature importance as an exploratory data analysis tool on Earth system models
Published 2025-02-01“…Our analyses focus on data from ensembles of Earth system models (ESMs) which provide data on different climate states and conditions. We elect to work with ESM ensembles since they allow us to compare feature importance across alternative scenarios not available with observed data. …”
Get full text
Article -
511
Qualitative Analysis of a COVID-19 Mathematical Model with a Discrete Time Delay
Published 2024-12-01“…This aspect is a crucial part of this work since other models assume exponential transition for this stage, which can be unrealistic. …”
Get full text
Article -
512
An interpretable and adaptable data-driven model for performance prediction in thermal plants
Published 2025-04-01“…By balancing predictive accuracy, interpretability, and transferability across plants, this work provides a practical framework for robust, data-driven monitoring and decision support in complex industrial power systems.…”
Get full text
Article -
513
A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos.
Published 2025-01-01“…Medical tests, including medical resonance imaging (MRI), computed tomography (CT) scans, biopsy, and electroencephalograms are used for early detection of glioma. …”
Get full text
Article -
514
Association Between Dietary Flavonoid Intake and Cardiovascular Health in Cancer Survivors: A Cross-Sectional Study
Published 2024-10-01“…Then, weighted quantile sum (WQS) regression and quantile-based g-computation (qgcomp) models were performed to assess the mixed effects of the six flavonoid subclasses and to determine the major flavonoid types. …”
Get full text
Article -
515
Automatic segmentation of chest X-ray images via deep-improved various U-Net techniques
Published 2025-08-01“…These models also incurred significantly higher computational costs. In contrast, U-Net16 and U-Net32 demonstrated reduced segmentation accuracy compared to U-Net9. …”
Get full text
Article -
516
The series solutions of fractional foam drainage and fractional modified regularized long wave problems
Published 2024-11-01“…Abstract In general, integer order differential equations fall short of adequately describing a range of phenomena in many disciplines of science and engineering when compared to fractional order differential equations. …”
Get full text
Article -
517
A novel and optimized design of D-latch and D flip-flop for QCA-based digital systems
Published 2025-08-01Get full text
Article -
518
LiDAR-Based Road Cracking Detection: Machine Learning Comparison, Intensity Normalization, and Open-Source WebGIS for Infrastructure Maintenance
Published 2025-04-01“…A key contribution of this work is the integration of geospatial analytics into an interactive, open-source WebGIS environment—developed using Blender, QGIS, and Lizmap—to support predictive maintenance planning. …”
Get full text
Article -
519
The effect of prone positioning on maternal haemodynamics and fetal wellbeing in the third trimester-A primary cohort study with a scoping review.
Published 2023-01-01“…The decline in CO may be due to caval compression, as supported by the computational model. Further work is needed to optimise the safety of prone positioning in pregnancy.…”
Get full text
Article -
520
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01“…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
Get full text
Article