Results 121 to 130 of about 148,474 (293)

Perfect contrast visual cryptography scheme

open access: yesTongxin xuebao, 2009
A perfect contrast visual cryptography scheme with the best contrast based on both the perfect black visual cryptography scheme(PBVCS) and the non-perfect black visual cryptography scheme(NPBVCS) was proposed.The proposed scheme applied simple Boolean ...
HAN Yan-yan1, HE Wen-cai1, HU Yu-pu1
doaj   +2 more sources

Unpacking ESG Controversies: A Proposed Integrated Framework of Organizational Frictions and Fallout From a Systematic Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Research on ESG controversies has expanded rapidly, but findings remain fragmented and lack a unifying perspective. This study conducts a PRISMA‐guided, framework‐based systematic review of 68 empirical articles published between 2018 and 2025 (May) to synthesize the main determinants and consequences of ESG controversies.
Cristina Alexandrina Ştefănescu   +1 more
wiley   +1 more source

Some Boolean matrix operators

open access: yesElectronics Letters, 1972
The Boolean matrices employed here were first described by J.O. Campeau, and were used to analyse swtiching and counting circuits. This letter describes their use in the manipulation of Boolean functions, and also a method whereby any function may be re-expressed in terms of any logical combination of its defining variables.
openaire   +1 more source

Tensions of Sustainability Logics: Performance of a Company Utilizing a Sustainable Business Model

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT In recent years, companies have used sustainable business models to gain a competitive advantage. However, there are tensions due to the inconsistency between social, environmental, and economic logic in sustainable business models, making it difficult for companies to change. To understand the existing tensions and interactions between logics,
Ann‐Kristin Thienemann
wiley   +1 more source

Interactive Framework on Absorptive Capacity and Organizational Learning for Circular Economy Transition

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The transition to a circular economy (CE) requires organizations to move beyond linear production systems toward regenerative, resource‐efficient models. For small and medium‐sized enterprises (SMEs), this transition is especially demanding due to constrained financial, technological, and human resources.
Hadi Zarea
wiley   +1 more source

Morphisms and Duality for Polarities and Lattices with Operators

open access: yes, 2019
Structures based on polarities have been used to provide relational semantics for propositional logics that are modelled algebraically by non-distributive lattices with additional operators.
Goldblatt, Robert
core  

Nondeterminism and boolean operations in pda's

open access: yesJournal of Computer and System Sciences, 1978
AbstractThere are nondeterministic context-free languages that cannot be expressed as a Boolean formula over deterministic context-free languages. The closure of the context-free languages under intersection does not yield closure under complementation.
openaire   +1 more source

An Indicator‐Based Decision Framework for Circular Bioeconomy Transition in the Steel Industry: Integrating Multiphase Learning and Cooperative Game Modelling

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Despite growing attention to the circular bioeconomy (CBE), the steel industry currently lacks a standardised, sectoral measurement framework to facilitate a low‐carbon transition. In this study, a decision‐support framework for evaluating CBE performance in the steel industry is proposed.
Ali Zamani Babgohari   +2 more
wiley   +1 more source

FPGA-Based Implementation of Genetically Tuned Fuzzy Logic Controller (GA-FLC)

open access: yesJournal of Engineering and Sustainable Development, 2012
Fuzzy Logic controller (FLC) contains three operations; the fuzzification of the inputs, the knowledge base (data base and rule base), and the defuzzification of the output. In this paper our fuzzy controller contains two inputs and one output each have
Emad A. Hussein, Ammar G. Samir
doaj  

Secure Genomic String Search with Parallel Homomorphic Encryption

open access: yesInformation
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today’s data security problems. While effective FHE platforms can address modern data security concerns in unsecure
Md Momin Al Aziz   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy