Results 61 to 70 of about 31,786 (276)

An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

open access: yesIEEE Access, 2023
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants.
Bishoy K. Sharobim   +5 more
doaj   +1 more source

Grunwald- Wang Theorem, an Effective Version

open access: yes, 2014
The main purpose of this note is to establish an effective version of the Grunwald--Wang Theorem, which asserts that given a family of local characters $\chi^{v}$ of $K_{v}^{*}$ of exponent $m$ where $v \in S$ for a finite set $S$ of primes of $K$, there
Wang, Song
core   +1 more source

Temperature Sensitivity and Adaptation of Cereal Yields: Empirical Evidence From Italy

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT This paper investigates the evolving temperature sensitivity and climate adaptation of cereal yields in Italy from 1952 to 2023, using province‐level data for maize, common wheat, and durum wheat. Employing panel data econometric methods, we estimate yield responses to heat exposure, changes in sensitivity over time, and adaptation to climate ...
Paolo Nota   +2 more
wiley   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

System for generating timing and control signals [PDF]

open access: yes, 1975
A system capable of generating every possible data frame subperiod and delayed subperiod of a data frame of length of M clock pulse intervals (CPIs) comprised of parallel modulo-m sub i counters is presented.
Messner, A., Perlman, M., Rousey, W. J.
core   +1 more source

Machine Learning‐Assisted Second‐Order Perturbation Theory for Chemical Potential Correction Toward Hubbard U Determination

open access: yesAdvanced Intelligent Discovery, EarlyView.
In this work, the Doubao large language model (LLM) is involved in the formula derivation processes for Hubbard U determination regarding the second‐order perturbations of the chemical potential. The core ML tool is optimized for physical domain knowledge, which is not limited to parameter prediction but rather serves as an interactive physical theory ...
Mingzi Sun   +8 more
wiley   +1 more source

Verifiable (n,n) Threshold Quantum Secret Sharing Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
This paper constructs a class of verifiable secret sharing scheme based on Chinese Remainder Theorem and Bell states.In the distribution phase,Alice distributes the shares to the participants through the quantum secure channel.In the recovery phase,Alice
MA Min,LI Zhihui,XU Tingting
doaj   +1 more source

Sampling Strategy: An Overlooked Factor Affecting Artificial Intelligence Prediction Accuracy of Peptides’ Physicochemical Properties

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study reveals that sampling strategy (i.e., sampling size and approach) is a foundational prerequisite for building accurate and generalizable AI models in peptide discovery. Reaching a threshold of 7.5% of the total tetrapeptide sequence space was essential to ensure reliable predictions.
Meiru Yan   +3 more
wiley   +1 more source

On weakly prime-additive numbers with length $4k+3$

open access: yesComptes Rendus. Mathématique
If a positive integer $n$ has at least two distinct prime divisors and can be written as $n=p_1^{\alpha _1}+\dots +p_t^{\alpha _t}$, where $p_13$, there exist infinitely many weakly prime-additive numbers $n$ with $m\mid n$ and $n=p_1^{\alpha _1}+\dots ...
Fang, Jin-Hui, Xue, Fang-Gang
doaj   +1 more source

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2013
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage
Xinkai Li, Chao Lu, Jon A. Sjogren
doaj   +1 more source

Home - About - Disclaimer - Privacy