Results 61 to 70 of about 31,786 (276)
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants.
Bishoy K. Sharobim +5 more
doaj +1 more source
Grunwald- Wang Theorem, an Effective Version
The main purpose of this note is to establish an effective version of the Grunwald--Wang Theorem, which asserts that given a family of local characters $\chi^{v}$ of $K_{v}^{*}$ of exponent $m$ where $v \in S$ for a finite set $S$ of primes of $K$, there
Wang, Song
core +1 more source
Temperature Sensitivity and Adaptation of Cereal Yields: Empirical Evidence From Italy
ABSTRACT This paper investigates the evolving temperature sensitivity and climate adaptation of cereal yields in Italy from 1952 to 2023, using province‐level data for maize, common wheat, and durum wheat. Employing panel data econometric methods, we estimate yield responses to heat exposure, changes in sensitivity over time, and adaptation to climate ...
Paolo Nota +2 more
wiley +1 more source
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
System for generating timing and control signals [PDF]
A system capable of generating every possible data frame subperiod and delayed subperiod of a data frame of length of M clock pulse intervals (CPIs) comprised of parallel modulo-m sub i counters is presented.
Messner, A., Perlman, M., Rousey, W. J.
core +1 more source
In this work, the Doubao large language model (LLM) is involved in the formula derivation processes for Hubbard U determination regarding the second‐order perturbations of the chemical potential. The core ML tool is optimized for physical domain knowledge, which is not limited to parameter prediction but rather serves as an interactive physical theory ...
Mingzi Sun +8 more
wiley +1 more source
Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj +1 more source
This study reveals that sampling strategy (i.e., sampling size and approach) is a foundational prerequisite for building accurate and generalizable AI models in peptide discovery. Reaching a threshold of 7.5% of the total tetrapeptide sequence space was essential to ensure reliable predictions.
Meiru Yan +3 more
wiley +1 more source
On weakly prime-additive numbers with length $4k+3$
If a positive integer $n$ has at least two distinct prime divisors and can be written as $n=p_1^{\alpha _1}+\dots +p_t^{\alpha _t}$, where $p_13$, there exist infinitely many weakly prime-additive numbers $n$ with $m\mid n$ and $n=p_1^{\alpha _1}+\dots ...
Fang, Jin-Hui, Xue, Fang-Gang
doaj +1 more source
Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic [PDF]
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage
Xinkai Li, Chao Lu, Jon A. Sjogren
doaj +1 more source

