Results 51 to 60 of about 51,497 (156)
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
We propose an optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase double-random-phase encryption with photon-counting imaging method and applying an ...
A. Markman, B. Javidi, M. Tehranipoor
doaj +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Investment centre manager's multiperiod fairness perceptions and intertemporal dependency
Abstract This paper explores the motivation of investment centre managers when their investment centre's performance is affected by decisions made by their predecessor. Through a qualitative case study of a Japanese manufacturer, the effectiveness of conventional remedies for motivational issues and further motivational issues caused by the same ...
Hiroyuki Selmes‐Suzuki
wiley +1 more source
A cryptographic method to have a secure communication of health care digital data into the cloud
Cloud computing is a technology that holds great promise and has potential to revolutionize the healthcare sector. Many security and privacy issues are brought up by the cloud’s centralization of data for both patients and healthcare professionals. There
K. Selvakumar, S. Lokesh
doaj +1 more source
Variable‐Rate Texture Compression: Real‐Time Rendering with JPEG
Abstract Although variable‐rate compressed image formats such as JPEG are widely used to efficiently encode images, they have not found their way into real‐time rendering due to special requirements such as random access to individual texels. In this paper, we investigate the feasibility of variable‐rate texture compression on modern GPUs using the ...
Elias Kristmann +2 more
wiley +1 more source
Error Free Perfect Secrecy Systems
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret message cannot be larger than the entropy of the secret key initially shared by the sender and the legitimate receiver. Massey gave an information theoretic proof of this
Chan, Terence H. +3 more
core +1 more source
NAADF: Globally Illuminated Voxel Worlds Accelerated with Nested Axis‐Aligned Distance Fields
Abstract Achieving realistic rendering of 3D scenes in real time using path tracing is challenging due to the high sample count required, with ray tracing as the bottleneck. Focusing on voxels as a geometry representation offers significant opportunities for optimizations, especially for tracing the rays, but also for computing the samples.
A. Ulschmid +4 more
wiley +1 more source
An Efficient Coding Technique for Stochastic Processes
In the framework of coding theory, under the assumption of a Markov process (Xt) on a finite alphabet A, the compressed representation of the data will be composed of a description of the model used to code the data and the encoded data. Given the model,
Jesús E. García +3 more
doaj +1 more source
We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding.
Gagie, Travis
core +5 more sources
Effects of parachute science on local research capacity 降落伞科学对当地研究能力的影响
Abstract Strengthening research capacity is essential to address the global biodiversity crisis. Yet, parachute science often undermines this goal, and its prevalence, costs, and benefits are unclear. We analyzed 13,502 publications on primate research that we extracted from Scopus (1960–2022) to evaluate the effects of parachute science on local ...
Li Yang +11 more
wiley +1 more source

