Results 101 to 110 of about 36,777 (311)
Abstract Attempts to address biodiversity loss have led to ecosystem and species restoration efforts. Tree species restoration is particularly relevant because of increasing threats from pests and pathogens. However, there are different notions of ‘loss’, as well as sociocultural considerations, including social acceptability, which are often neglected
Fritha West +4 more
wiley +1 more source
In e-Cash, signer must sign a value without seeing it's content directly. Traditional RSA based approaches encounter a fundamental problem named Chosen Text Attack. The main aim of this research is to propose an approach to overcome such attack. Although
hadi hodjati talemi, reza boostani
doaj +2 more sources
Enhanced Adaptive Over-Segmentation Technique for Image Forgery Detection under Noise Attacks
Fatiha Qudrat, Sunil Patil
openalex +1 more source
ABSTRACT A major challenge in fabricating eutectic NiTiNb alloys is the incomplete melting of Nb due to its much higher melting point than the NiTi matrix. In this work, a novel electron‐beam freeform additive manufacturing strategy is developed to eliminate unmelted Nb particles and achieve a fully eutectic structure through independent dual‐wire ...
Qing‐Da Zhang +9 more
wiley +1 more source
Dual‐Stage Heat Treatment for Enhanced Hydrogen Storage Properties of Mg−Ni−Y Alloys
ABSTRACT Mg−Ni−Y alloy is considered to be one of the most promising hydrogen storage materials, but its high dehydrogenation energy barrier hinders its practical application. A dual‐stage heat treatment (490°C × 4 h + 550°C × 4 h) is applied to optimize the microstructure and hydrogen storage performance of a vacuum‐melted Mg94Ni3Y3 alloy.
You Lv +6 more
wiley +1 more source
Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information [PDF]
Yong Huang +4 more
openalex +1 more source
A CALculation of PHAse Diagrams thermodynamic modeling for Fe–Sn–C system is carried out. The model and the developed database can be used to calculate phase diagrams and thermodynamic properties of this system over wide temperature/composition range, and a part of a larger thermodynamic database for steel and alloy system, and effectively used to ...
Won‐Bum Park +2 more
wiley +1 more source
Accelerating m‐Invariance for Continuous Big Data Publishing
To prevent personal information leakage from the collection and publication of big data, anonymization techniques that protect privacy while preserving data utility are essential. In particular, m‐invariance provides privacy protection for dynamic datasets that are continuously published as records are updated.
Kentaro Morise, Hiroaki Nishi
wiley +1 more source
(t, n) Threshold d-Level Quantum Secret Sharing
Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected.
Xiu-Li Song +3 more
doaj +1 more source

