![Axioms | Free Full-Text | On the Application of the Block Hybrid Methods to Solve Linear and Non-Linear First Order Differential Equations Axioms | Free Full-Text | On the Application of the Block Hybrid Methods to Solve Linear and Non-Linear First Order Differential Equations](https://www.mdpi.com/axioms/axioms-12-00189/article_deploy/html/images/axioms-12-00189-g001.png)
Axioms | Free Full-Text | On the Application of the Block Hybrid Methods to Solve Linear and Non-Linear First Order Differential Equations
![Sensors | Free Full-Text | Application of Pulse Compression Technique in High-Temperature Carbon Steel Forgings Crack Detection with Angled SV-Wave EMATs Sensors | Free Full-Text | Application of Pulse Compression Technique in High-Temperature Carbon Steel Forgings Crack Detection with Angled SV-Wave EMATs](https://www.mdpi.com/sensors/sensors-23-02685/article_deploy/html/images/sensors-23-02685-g001.png)
Sensors | Free Full-Text | Application of Pulse Compression Technique in High-Temperature Carbon Steel Forgings Crack Detection with Angled SV-Wave EMATs
![Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks - ScienceDirect Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S0045790622005158-gr6.jpg)
Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks - ScienceDirect
![PDF) Higher order stable generalized finite element method for the elliptic eigenvalue problem with an interface in 1D | Quanling Deng - Academia.edu PDF) Higher order stable generalized finite element method for the elliptic eigenvalue problem with an interface in 1D | Quanling Deng - Academia.edu](https://0.academia-photos.com/attachment_thumbnails/84351023/mini_magick20220417-2849-1670ind.png?1650237550)
PDF) Higher order stable generalized finite element method for the elliptic eigenvalue problem with an interface in 1D | Quanling Deng - Academia.edu
![Sensors | Free Full-Text | Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles Sensors | Free Full-Text | Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles](https://www.mdpi.com/sensors/sensors-23-02664/article_deploy/html/images/sensors-23-02664-g001.png)
Sensors | Free Full-Text | Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles
![Numerical results for () s with nonnegative s. Table shows the number... | Download Scientific Diagram Numerical results for () s with nonnegative s. Table shows the number... | Download Scientific Diagram](https://www.researchgate.net/publication/332164474/figure/tbl1/AS:774416459898882@1561646680408/Numerical-results-for-s-with-nonnegative-s-Table-shows-the-number-of-preconditioned.png)
Numerical results for () s with nonnegative s. Table shows the number... | Download Scientific Diagram
![Symmetry | Free Full-Text | A New Conservative Hyperchaotic System-Based Image Symmetric Encryption Scheme with DNA Coding Symmetry | Free Full-Text | A New Conservative Hyperchaotic System-Based Image Symmetric Encryption Scheme with DNA Coding](https://pub.mdpi-res.com/symmetry/symmetry-13-02317/article_deploy/html/images/symmetry-13-02317-g001a.png?1638779888)
Symmetry | Free Full-Text | A New Conservative Hyperchaotic System-Based Image Symmetric Encryption Scheme with DNA Coding
![Symmetry | Free Full-Text | Small-Signal Stability of Multi-Converter Infeed Power Grids with Symmetry Symmetry | Free Full-Text | Small-Signal Stability of Multi-Converter Infeed Power Grids with Symmetry](https://pub.mdpi-res.com/symmetry/symmetry-13-00157/article_deploy/html/images/symmetry-13-00157-g001.png?1612681026)
Symmetry | Free Full-Text | Small-Signal Stability of Multi-Converter Infeed Power Grids with Symmetry
![BCALS: Blockchain‐based secure log management system for cloud computing - Ali - 2022 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library BCALS: Blockchain‐based secure log management system for cloud computing - Ali - 2022 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/38338a3e-281a-48b5-abb4-ada7bbb90930/ett4272-fig-0001-m.jpg)
BCALS: Blockchain‐based secure log management system for cloud computing - Ali - 2022 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library
![Privacy‐preserving blockchain‐based contract signing with multi‐party supervision - Zhang - Transactions on Emerging Telecommunications Technologies - Wiley Online Library Privacy‐preserving blockchain‐based contract signing with multi‐party supervision - Zhang - Transactions on Emerging Telecommunications Technologies - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/e61ffd06-1d66-406a-94c4-f3fba57b2277/ett4710-fig-0003-m.png)
Privacy‐preserving blockchain‐based contract signing with multi‐party supervision - Zhang - Transactions on Emerging Telecommunications Technologies - Wiley Online Library
![SENSIBLE: SEquestered aNd SynergIstic BLockchain Ecosystem - Kshirsagar - Engineering Reports - Wiley Online Library SENSIBLE: SEquestered aNd SynergIstic BLockchain Ecosystem - Kshirsagar - Engineering Reports - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/35fad575-eaa5-4cae-80da-a0488a6d538c/eng212586-fig-0002-m.jpg)
SENSIBLE: SEquestered aNd SynergIstic BLockchain Ecosystem - Kshirsagar - Engineering Reports - Wiley Online Library
![Filter Specifications and Approximation Theory (The Mathematical Approach to the Approximation Problem) | SpringerLink Filter Specifications and Approximation Theory (The Mathematical Approach to the Approximation Problem) | SpringerLink](https://media.springernature.com/lw685/springer-static/image/chp%3A10.1007%2F978-3-030-00096-7_3/MediaObjects/448699_1_En_3_Figd_HTML.png)
Filter Specifications and Approximation Theory (The Mathematical Approach to the Approximation Problem) | SpringerLink
![Symmetry | Free Full-Text | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks Symmetry | Free Full-Text | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks](https://www.mdpi.com/symmetry/symmetry-14-01711/article_deploy/html/images/symmetry-14-01711-g001-550.jpg)
Symmetry | Free Full-Text | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks
![Frontiers | A framework for computing angle of progression from transperineal ultrasound images for evaluating fetal head descent using a novel double branch network Frontiers | A framework for computing angle of progression from transperineal ultrasound images for evaluating fetal head descent using a novel double branch network](https://www.frontiersin.org/files/Articles/940150/fphys-13-940150-HTML/image_m/fphys-13-940150-g001.jpg)
Frontiers | A framework for computing angle of progression from transperineal ultrasound images for evaluating fetal head descent using a novel double branch network
![Separable solutions to nonlinear anisotropic diffusion equation in elliptic coordinates | Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences Separable solutions to nonlinear anisotropic diffusion equation in elliptic coordinates | Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences](https://royalsocietypublishing.org/cms/asset/d7e4c3b7-5843-4a08-8521-1a38eb8df0fa/rsta20220077f02.gif)