Results 21 to 30 of about 19,120,707 (376)
An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj +1 more source
An important step when designing a study is to justify the sample size that will be collected. The key aim of a sample size justification is to explain how the collected data is expected to provide valuable information given the inferential goals of the ...
D. Lakens
semanticscholar +1 more source
Numerical method for finite-size security analysis of quantum key distribution
Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key ...
Hongyi Zhou +2 more
doaj +1 more source
An Intelligent Solution for Automatic Garment Measurement Using Image Recognition Technologies
Global digitization trends and the application of high technology in the garment market are still too slow to integrate, despite the increasing demand for automated solutions. The main challenge is related to the extraction of garment information-general
Agne Paulauskaite-Taraseviciene +5 more
doaj +1 more source
Estimating the size of key populations [PDF]
Estimation of key population sizes is essential for advocacy, program planning, and monitoring of HIV epidemics in these populations. A review of recent publications on population size estimation among key populations including MSM, people who inject drugs, and male and female sex workers was conducted to identify and assess current practices at the ...
Abu S, Abdul-Quader +2 more
openaire +2 more sources
Practical challenges in quantum key distribution [PDF]
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni +3 more
core +3 more sources
Don't break a leg: Running birds from quail to ostrich prioritise leg safety and economy in uneven terrain [PDF]
Cursorial ground birds are paragons of bipedal running that span a 500-fold mass range from quail to ostrich. Here we investigate the task-level control priorities of cursorial birds by analysing how they negotiate single-step obstacles that create a ...
Birn-Jeffery, A V +6 more
core +7 more sources
Finite-size effects for anisotropic bootstrap percolation: logarithmic corrections [PDF]
In this note we analyze an anisotropic, two-dimensional bootstrap percolation model introduced by Gravner and Griffeath. We present upper and lower bounds on the finite-size effects.
A. Holroyd +28 more
core +4 more sources
Key point detection method for fish size measurement based on deep learning
Accurate fish size measurement in breeding areas is crucial for the fishing industry. Unlike acoustic methods with high equipment cost and low measurement accuracy, current image‐based methods offer a promising alternative.
Yaozhen Yu, Hao Zhang, Fei Yuan
doaj +1 more source
Plant size: a key determinant of diversification? [PDF]
SummaryExplaining the variation in diversification rate across groups of plants has long been an important goal of botanists. In plants, complex scenarios involving a combination of extrinsic opportunities and intrinsic traits have been used to explain rapid diversification in certain groups. However, we feel that a very simple trait has been neglected
Florian C, Boucher +3 more
openaire +2 more sources

