Results 61 to 70 of about 2,658 (123)
We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in \cite{St}. An AONT is a bijective mapping that constructs s outputs from s inputs. We consider the security of t inputs, when s-t outputs are known.
D'Arco, Paolo +2 more
core +1 more source
Efficient Two-Stage Group Testing Algorithms for Genetic Screening
Efficient two-stage group testing algorithms that are particularly suited for rapid and less-expensive DNA library screening and other large scale biological group testing efforts are investigated in this paper.
Huber, Michael
core +1 more source
Growing importance of price: Investigating food values before and during high inflation in Germany
Abstract Considering the consumption‐induced intensification of global challenges and the continuously changing consumer needs, it is important to understand the drivers of consumer food choices under external pressures. We applied best–worst scaling to elicit the relative importance of 11 food values and conducted latent class cluster analyses based ...
Corinna Hempel, Jutta Roosen
wiley +1 more source
Mutual incidence matrix of two balanced incomplete block designs
Abstract We propose to consider a mutual incidence matrix M $M$ of two balanced incomplete block designs built on the same finite set. In the simplest case, this matrix reduces to the standard incidence matrix of one block design. We find all eigenvalues of the matrices M M T $M{M}^{T}$ and M T M ${M}^{T}M$ and their eigenspaces.
Alexander Shramchenko +1 more
wiley +1 more source
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design [PDF]
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before ...
Hamid Haj Seyyed Javadi +1 more
doaj
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval [PDF]
We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al.
Stinson, Douglas R., Swanson, Colleen M.
core +1 more source
Resolvable designs with large blocks
Resolvable designs with two blocks per replicate are studied from an optimality perspective. Because in practice the number of replicates is typically less than the number of treatments, arguments can be based on the dual of the information matrix and ...
Morgan, J. P., Reck, Brian H.
core +2 more sources
Detection of Factor XI Deficiency (FXID) and Complex Vertebral Malformation (CVM) in Bali Cattle
Factor XI Deficiency (FXID) is caused by imperfect insertion of poly adenine which is resulted in introduction of premature stop codon in FXI gene. Substitution of guanine into thymine in SLC35A3 gene caused Complex Vertebral Malformation (CVM).
S. W. Siswanti , C. Sumantri , Jakaria
doaj +1 more source
On a class of column‐weight 3 decomposable LDPC codes with the analysis of elementary trapping sets
In this paper, some variations of edge coloring of graphs are used to construct some column‐weight‐three decomposable LDPC codes with girths at least six and eight. Applying the presented method on several known classes of bipartite graphs, some classes of column‐weight‐three decomposable LDPC codes are derived having flexibility in length and rate ...
G. Raeisi, M. Gholami
wiley +1 more source
Apolipoprotein E (APOE) ε4 was associated with cognitive impairment. Patients with Alzheimer's disease carrying APOE ε4 had decreased nerve growth factor (NGF) levels in cerebrospinal fluid. Declined NGF is correlated with compromised cognitive function, including global cognition and multiple cognitive domains.
Mingyue He +16 more
wiley +1 more source

