Skip Content
You are currently on the new version of our website. Access the old version .

109 Results Found

  • Article
  • Open Access
2 Citations
4,576 Views
11 Pages

Trap-Door Thoracotomy and Clamshell Thoracotomy as Surgical Approaches for Neuroblastoma and Other Thoracic Tumors in Children

  • Benjamin F. B. Mayer,
  • Matthias C. Schunn,
  • Cristian Urla,
  • Jürgen F. Schäfer,
  • Frank Fideler,
  • Felix Neunhoeffer,
  • Martin U. Schuhmann,
  • Steven W. Warmann and
  • Jörg Fuchs

15 January 2024

Solid tumors of the cervicothoracic junction, the posterior mediastinum, or bilateral dorsal thoracic tumors represent a challenge in pediatric surgical oncology. The aim of this study was to evaluate trap-door thoracotomy and clamshell thoracotomy a...

  • Article
  • Open Access
4 Citations
2,905 Views
16 Pages

Analysis of Earth Pressure Variation for Partial Displacement of Retaining Wall

  • Hongbo Zhang,
  • Mingpeng Liu,
  • Pengfei Zhou,
  • Zhizhong Zhao,
  • Xiaoliang Li,
  • Xiaobin Xu and
  • Xiuguang Song

1 May 2021

Parts of the retaining wall might produce displacement under different load conditions. The moveable wall could impact the adjacent fixed wall, mainly reflecting on the variation of earth pressure and formation of the soil arching effect. This paper...

  • Article
  • Open Access
5 Citations
2,239 Views
14 Pages

Contribution to Bone Formation of the Schneiderian Membrane after Sinus Augmentation: A Histological Study in Rabbits

  • Su Tien Lim,
  • Kaoru Kusano,
  • Tomohide Taniyama,
  • Shigeru Sakuma,
  • Yasushi Nakajima,
  • Samuel Porfirio Xavier and
  • Shunsuke Baba

15 November 2022

Aim: to evaluate bone formation in close contact with the sinus mucosa after different periods from sinus augmentation and the influence on healing of the presence of an inward dis-placed bone window. Material and Methods: Eighteen rabbits were inclu...

  • Article
  • Open Access
5 Citations
4,702 Views
15 Pages

Continuous Leakage Resilient Lossy Trapdoor Functions

  • Sujuan Li,
  • Yi Mu,
  • Mingwu Zhang and
  • Futai Zhang

23 March 2017

Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such...

  • Article
  • Open Access
6 Citations
2,916 Views
23 Pages

A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates

  • Xiayu Wang,
  • Yineng Chen,
  • Xinghui Zhu,
  • Cheng Li and
  • Kui Fang

18 January 2024

Applying chameleon hash functions to redactable blockchains is still challenging work. Most redactable blockchain solutions using this technique have potential problems, such as too weak decentralization performance and trapdoors with exposure risks....

  • Article
  • Open Access
5 Citations
3,770 Views
11 Pages

12 August 2020

With the rapid development of cloud computing, massive data are transferred to cloud servers for storage and management savings. For privacy concerns, data should be encrypted before being uploaded. In the encrypted-domain (ED), however, many data co...

  • Article
  • Open Access
9 Citations
3,879 Views
21 Pages

An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things

  • Hong Shu,
  • Fulong Chen,
  • Dong Xie,
  • Liping Sun,
  • Ping Qi and
  • Yongqing Huang

29 September 2019

With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applicatio...

  • Article
  • Open Access
6 Citations
3,498 Views
8 Pages

11 March 2022

Orbital trapdoor fracture occurs more commonly in pediatric patients, and previous studies suggested early intervention for a better outcome. However, there is no consensus on the appropriate timing of emergent intervention due to the insufficient ca...

  • Article
  • Open Access
6 Citations
2,627 Views
15 Pages

Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors

  • Teklay Gebremichael,
  • Mikael Gidlund,
  • Gerhard P. Hancke and
  • Ulf Jennehag

30 May 2022

Group communication enables Internet of Things (IoT) devices to communicate in an efficient and fast manner. In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. In this paper, we add...

  • Article
  • Open Access
2 Citations
2,579 Views
16 Pages

30 June 2023

Catastrophic wildfires impacted large areas of western Kangaroo Island (KI), South Australia in 2019–2020, burning habitat for many species, including large proportions of the distributional range of the KI micro-trapdoor spider Moggridgea rain...

  • Case Report
  • Open Access
4 Citations
511 Views
8 Pages

Orbital trapdoor fractures (OTFs) entail entrapment of intraorbital soft tissues with minimal or no displacement of the affected bones and are almost exclusively seen in children. This article aimed to report the diagnosis and treatment of an OTF of...

  • Article
  • Open Access
817 Views
16 Pages

Analysis of Selected Methods of Computer-Aided Design for Stage Structures

  • Szymon Wyrąbkiewicz,
  • Marcin Zastempowski,
  • Jurand Burczyński and
  • Maciej Gajewski

29 May 2025

This article presents the design process for a modern stage trapdoor, which was designed to optimize the work of cultural facilities personnel and increase the attractiveness of future performances and events. Strength calculations for the supporting...

  • Article
  • Open Access
10 Citations
3,106 Views
20 Pages

3 September 2021

Soil arching, which occurs in the piled embankments, plays an important role in stress redistribution between the relatively soft subsoil and the stiffer piles. The formation of the soil arching depends on the differential settlement of the embankmen...

  • Article
  • Open Access
2 Citations
2,706 Views
16 Pages

Three-Dimensional Theoretical Model for Soil Arching with Inclined Slip Surfaces

  • Qizhi Chen,
  • Luju Liang,
  • Changjie Xu,
  • Baoping Zou and
  • Xiangxiang Gao

7 May 2022

Terzaghi proposed two-dimensional (2D) arching theory through trapdoor tests based on the assumption of a vertical slip surfaces. However, the original 2D assumption is different from a real three-dimensional (3D) excavation condition and actual slip...

  • Article
  • Open Access
4 Citations
3,161 Views
18 Pages

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

  • Jingwei Lu,
  • Hongbo Li,
  • Jianye Huang,
  • Sha Ma,
  • Man Ho Allen Au and
  • Qiong Huang

21 February 2023

Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for t...

  • Article
  • Open Access
1 Citations
1,706 Views
18 Pages

13 May 2024

The smart grid, as a crucial part of modern energy systems, handles extensive and diverse data, including inputs from various sensors, metering devices, and user interactions. Outsourcing data storage to remote cloud servers presents an economical so...

  • Article
  • Open Access
4,873 Views
8 Pages

Combined Subciliary/Transantral Approach for Reconstruction of Orbital Floor Fracture

  • Norihiko Narita,
  • Yumi Ito,
  • Yukinori Kato,
  • Yukihiro Kimura,
  • Yoshimasa Imoto,
  • Kazuhiro Ogi,
  • Masayuki Okamoto,
  • Tetsuji Takabayashi and
  • Shigeharu Fujieda

Orbital floor fracture, especially with constriction of orbital soft tissue, should be reconstructed surgically. Although various approaches to treat the orbital floor have been reported, procedures have not been unified among hospitals or surgeons....

  • Article
  • Open Access
21 Citations
5,153 Views
20 Pages

4 January 2021

The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can h...

  • Article
  • Open Access
56 Citations
7,071 Views
24 Pages

10 March 2020

Different from the traditional healthcare field, Medical Cyber Physical Systems (MCPS) rely more on wireless wearable devices and medical applications to provide better medical services. The secure storage and sharing of medical data are facing great...

  • Article
  • Open Access
18 Citations
4,906 Views
13 Pages

1 March 2019

The Internet of things (IoT) has become a significant part of our daily life. Composed of millions of intelligent devices, IoT can interconnect people with the physical world. With the development of IoT technology, the amount of data generated by se...

  • Review
  • Open Access
24 Citations
8,267 Views
22 Pages

On Advances of Lattice-Based Cryptographic Schemes and Their Implementations

  • Harshana Bandara,
  • Yasitha Herath,
  • Thushara Weerasundara and
  • Janaka Alawatugoda

Lattice-based cryptography is centered around the hardness of problems on lattices. A lattice is a grid of points that stretches to infinity. With the development of quantum computers, existing cryptographic schemes are at risk because the underlying...

  • Article
  • Open Access
4 Citations
2,332 Views
17 Pages

15 February 2023

In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems. To provide an authorization mechanism to limit the comparison of...

  • Article
  • Open Access
2 Citations
1,498 Views
17 Pages

With the increasing emphasis on safeguarding maritime sovereignty and developing marine resources, the security of underwater acoustic communication has risen to a new level of importance. Given the complex environmental challenges faced by underwate...

  • Article
  • Open Access
3 Citations
481 Views
7 Pages

Introduction: Orbital floor fractures occur commonly as a result of blunt trauma to the face and periorbital region. Orbital floor fractures with a “trapdoor” component allow both herniation and incarceration of contents through a bone defect into th...

  • Article
  • Open Access
20 Citations
2,935 Views
15 Pages

Enhancing Cloud Communication Security: A Blockchain-Powered Framework with Attribute-Aware Encryption

  • Raghunandan K. R.,
  • Bhavya Kallapu,
  • Radhakrishna Dodmane,
  • Krishnaraj Rao N. S.,
  • Srinivasarao Thota and
  • Aditya Kumar Sahu

14 September 2023

The global production of information continuously increases in quantity and variety. However, the tools and technologies developed to handle such large volumes of data have not adequately met the security and privacy requirements. Existing cloud secu...

  • Article
  • Open Access
2 Citations
2,217 Views
21 Pages

Passive Soil Arching Effect in Aeolian Sand Backfills for Grillage Foundation

  • Chengcheng Zhang,
  • Guanshi Liu,
  • Shengkui Tian and
  • Mingxuan Cai

27 September 2023

The passive soil arching effect exists in many soil–grille interaction systems. Increasing mental grillage foundations are used for transmission lines in aeolian sand areas; thus, exploring the evolution mechanism of passive soil arching is cru...

  • Feature Paper
  • Article
  • Open Access
5 Citations
5,866 Views
12 Pages

20 November 2016

Once thought to be uniquely human, prosocial behavior has been observed in a number of species, including vampire bats that engage in costly food-sharing. Another social chiropteran, Jamaican fruit bats (Artibeus jamaicensis), have been observed to e...

  • Review
  • Open Access
6 Citations
4,903 Views
11 Pages

Surgical Approaches to Pancoast Tumors

  • Francesco Petrella,
  • Monica Casiraghi,
  • Luca Bertolaccini and
  • Lorenzo Spaggiari

21 July 2023

Pancoast tumors, also defined as superior sulcus tumors, still represent a complex clinical condition requiring high technical surgical skills within more articulated multimodality treatment. The morbidity and mortality rates after Pancoast tumor tre...

  • Article
  • Open Access
5 Citations
6,004 Views
9 Pages

The Cervico-Parasternal Thoracotomy (CPT): A New Surgical Approach for the Resection of Cervicothoracic Neuroblastomas

  • Giuseppe Martucciello,
  • Federica Fati,
  • Stefano Avanzini,
  • Filippo Maria Senes and
  • Irene Paraboschi

17 March 2021

Cervicothoracic neuroblastomas (NBs) pose unique surgical challenges due to the complexity of the neurovascular structures located in the thoracic inlet. To date, two main techniques have been reported to completely remove these tumours in children:...

  • Article
  • Open Access
3 Citations
3,981 Views
14 Pages

16 July 2023

Widespread species are exposed to different environmental drivers and can consequently present variations in body shape and/or size. Trapdoor spiders of the genus Idiops are generally associated with a sedentary lifestyle and limited dispersion. Howe...

  • Article
  • Open Access
6 Citations
10,357 Views
22 Pages

Development of a Morphing Landing Gear Composite Door for High Speed Compound Rotorcraft

  • Antonio Chiariello,
  • Salvatore Orlando,
  • Pasquale Vitale,
  • Mauro Linari,
  • Raffaele Longobardi and
  • Luigi Di Palma

In the framework of fast rotorcraft, smoothness and flushness of external aerodynamic surfaces present challenges for high-speed conditions, where aerodynamics is the driver of helicopter performance. For AIRBUS-RACER helicopter the main landing gear...

  • Article
  • Open Access
3 Citations
2,053 Views
21 Pages

24 December 2024

Trains used in urban mass passenger transit often have side entrance doors through which passengers can rapidly enter and exit the train. These doors are typically electrically powered and automated. Many incidents have occurred in which a passenger...

  • Article
  • Open Access
8 Citations
6,091 Views
17 Pages

Suction Flows Generated by the Carnivorous Bladderwort Utricularia—Comparing Experiments with Mechanical and Mathematical Models

  • Krizma Singh,
  • Roberto C. Reyes,
  • Gabriel Campa,
  • Matthew D. Brown,
  • Fatima Hidalgo,
  • Otto Berg and
  • Ulrike K. Müller

15 March 2020

Suction feeding is a well-understood feeding mode among macroscopic aquatic organisms. The little we know about small suction feeders from larval fish suggests that small suction feeders are not effective. Yet bladderworts, an aquatic carnivorous pla...

  • Article
  • Open Access
5 Citations
3,860 Views
13 Pages

18 October 2021

Burrows are animal-built structures that can buffer their occupants against the vagaries of the weather and provide protection from predators. We investigated whether the trapdoors of wolf spider (Lycosa sp.; temporary working name "L. hyraculus") bu...

  • Article
  • Open Access
26 Citations
4,105 Views
17 Pages

Knowledge, Attitude, and Practices Survey in Greece before the Implementation of Sterile Insect Technique against Aedes albopictus

  • Angeliki Stefopoulou,
  • Shannon L. LaDeau,
  • Nefeli Syrigou,
  • George Balatsos,
  • Vasileios Karras,
  • Ioanna Lytra,
  • Evangelia Boukouvala,
  • Dimitrios P. Papachristos,
  • Panagiotis G. Milonas and
  • Antonios Michaelakis
  • + 2 authors

2 March 2021

Community involvement in Aedes albopictus management can be very efficient and result in raising awareness among citizens. Toward this end, a door-to-door campaign can encourage active community participation in vector control. The current study desc...

  • Article
  • Open Access
4 Citations
6,565 Views
24 Pages

A Novel Approach to Reduce Breaches of Aircraft Communication Data

  • Shahzaib Tahir,
  • Muhammad Arslan Shahbaz,
  • Hasan Tahir,
  • Muhammad Awais,
  • Fawad Khan,
  • Ruhma Tahir,
  • Saqib Saeed and
  • Abdullah M. Almuhaideb

30 December 2022

Aircraft are complex systems that rely heavily on monitoring and real-time communications with the base station. During aviation and flight operations, diverse data are gathered from different sources, including the Cockpit Voice Recorder (CVR), Flig...

  • Case Report
  • Open Access
6 Citations
5 Pages

Extraocular muscle entrapment in a nondisplaced orbital fracture, although a wellknown entity in pediatric trauma, is atypical in adults. It can present with a triad of bradycardia, nausea, and in rare cases, syncope, and result in severe fibrosis of...

  • Case Report
  • Open Access
1 Citations
3 Pages

Persistent Upgaze Restriction After Orbital Floor Fracture Repair

  • Sarah Willcox DeParis,
  • F. Lawson Grumbine,
  • M. Reza Vagefi and
  • Robert C. Kersten

Here we present two cases of marked postoperative upgaze restriction after successful repair of orbital floor fracture and release of inferior rectus entrapment. In both cases, follow-up imaging showed enlargement of the inferior rectus, and gradual...

  • Article
  • Open Access
1,283 Views
12 Pages

24 September 2024

Host rock deformation associated with sill emplacement is used to constrain magma transfer and storage within the upper crust. In contrast to classic models suggesting that the host rock above mafic sills is dominated by elastic bending, recent studi...

  • Article
  • Open Access
2 Citations
2,505 Views
10 Pages

Novel Authentication Protocols Based on Quadratic Diophantine Equations

  • Avinash Vijayarangan,
  • Veena Narayanan,
  • Vijayarangan Natarajan and
  • Srikanth Raghavendran

1 September 2022

The Diophantine equation is a strong research domain in number theory with extensive cryptography applications. The goal of this paper is to describe certain geometric properties of positive integral solutions of the quadratic Diophantine equation x1...

  • Article
  • Open Access
1,341 Views
15 Pages

Large-Scale Deployment of Lehmann’s Funnel Entry Traps to Control Malaria Mosquito Populations

  • Hamidou Maïga,
  • Roger Sanou,
  • Bazoumana B. D. Sow,
  • Adama Ouema,
  • Abdoul Azize Millogo,
  • Koama Bayili,
  • Aristide Sawdetuo Hien,
  • Simon P. Sawadogo,
  • Souro Abel Millogo and
  • Abdoulaye Diabaté
  • + 3 authors

Effective tools to prevent mosquito bites are essential for malaria control. The Lehmann Funnel Entry Trap (LFET), a window screen proven effective in reducing mosquito density, was tested for its large-scale impact on malaria vector control and comm...

  • Article
  • Open Access
4 Citations
2,206 Views
18 Pages

22 May 2023

Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of samp...

  • Article
  • Open Access
27 Citations
7,012 Views
22 Pages

Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources in...

  • Article
  • Open Access
1 Citations
2,227 Views
27 Pages

Practical NTRU Signcryption in the Standard Model

  • Jianhua Yan,
  • Xiuhua Lu,
  • Muzi Li,
  • Licheng Wang,
  • Jingxian Zhou and
  • Wenbin Yao

13 December 2023

Based on the NTRU trapdoor used in NIST’s Falcon, a signcryption scheme following the sign-then-encrypt paradigm is constructed. The existing partitioning technique based on Waters hash over the lattice can not complete the security reduction i...

  • Article
  • Open Access
1 Citations
3,319 Views
21 Pages

15 March 2025

This study aimed to shorten firefighter search times during indoor fires, allowing more people to be rescued, by enhancing disaster-prevention capabilities using building technologies. In indoor fires, fatalities are often caused by the failure of fi...

  • Article
  • Open Access
1,982 Views
21 Pages

4 October 2025

Modern subway platforms are generally equipped with platform screen door systems to enhance safety, but the gap between the platform screen doors and train doors may cause passengers or objects to become trapped, leading to accidents. Addressing the...

  • Article
  • Open Access
806 Views
19 Pages

Efficient k-Resilient Public Key Authenticated Encryption with Keyword Search

  • Koon-Ming Chan,
  • Swee-Huay Heng,
  • Syh-Yuan Tan and
  • Shing-Chiang Tan

Traditional encryption prioritises confidentiality but complicates search operations, requiring decryption before searches can be conducted. The public key encryption with keyword search (PEKS) scheme addresses this limitation by enabling authorised...

  • Article
  • Open Access
41 Citations
430 Views
5 Pages

Medial Wall Fracture: An Update

  • Christopher Thiagarajah and
  • Robert C. Kersten

This article is a review of the literature and update for management of medial orbital wall fractures. A retrospective review of the literature was performed via PubMed to review the diagnosis and management of medial wall orbital fractures. Medial w...

of 3