Results 101 to 110 of about 25,084,029 (287)
A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi+2 more
doaj +1 more source
Dynamic Analysis of a Fractional Breast Cancer Model with Incommensurate Orders and Optimal Control
This paper constructs a fundamental mathematical model to depict the therapeutic effects of two drugs on breast cancer patients. The model is described by fractional order differential equations with two control variables.
Yanling Zhao, Ruiqing Shi
doaj +1 more source
Juvenile sanctions for young adult offenders in the Netherlands: an opportunity for rehabilitation?
Background To improve rehabilitation and reduce recidivism, adolescent criminal law provides tailor-made sanctioning in which the emphasis is on the offender’s development.
Lise J. C. Prop+4 more
doaj +1 more source
This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.
openaire +3 more sources
Recent disastrous wildfire seasons highlight the urgent need for timely and accurate wildfire data to support relief efforts, to monitor the environmental impacts and to inform the public.
Michael Nolde+3 more
doaj +1 more source
πFL: Private, atomic, incentive mechanism for federated learning based on blockchain
Federated learning (FL) is predicated on the provision of high-quality data by multiple clients, which is then used to train global models. A plethora of incentive mechanism studies have been conducted with the objective of promoting the provision of ...
Kejia Chen+4 more
doaj
Knowledge distillation is one effective approach to compress deep learning models. However, the current distillation methods are relatively monotonous. There are still rare studies about the combination of distillation strategies using multiple types of ...
Ziyi Chen+5 more
doaj
Data Security Management in Distributed Computer Systems [PDF]
Adi Armoni
openalex +1 more source