Results 21 to 30 of about 19,120,707 (376)

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

Sample Size Justification

open access: yesCollabra: Psychology, 2021
An important step when designing a study is to justify the sample size that will be collected. The key aim of a sample size justification is to explain how the collected data is expected to provide valuable information given the inferential goals of the ...
D. Lakens
semanticscholar   +1 more source

Numerical method for finite-size security analysis of quantum key distribution

open access: yesPhysical Review Research, 2022
Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key ...
Hongyi Zhou   +2 more
doaj   +1 more source

An Intelligent Solution for Automatic Garment Measurement Using Image Recognition Technologies

open access: yesApplied Sciences, 2022
Global digitization trends and the application of high technology in the garment market are still too slow to integrate, despite the increasing demand for automated solutions. The main challenge is related to the extraction of garment information-general
Agne Paulauskaite-Taraseviciene   +5 more
doaj   +1 more source

Estimating the size of key populations [PDF]

open access: yesCurrent Opinion in HIV and AIDS, 2014
Estimation of key population sizes is essential for advocacy, program planning, and monitoring of HIV epidemics in these populations. A review of recent publications on population size estimation among key populations including MSM, people who inject drugs, and male and female sex workers was conducted to identify and assess current practices at the ...
Abu S, Abdul-Quader   +2 more
openaire   +2 more sources

Practical challenges in quantum key distribution [PDF]

open access: yes, 2016
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key ...
Diamanti, Eleni   +3 more
core   +3 more sources

Don't break a leg: Running birds from quail to ostrich prioritise leg safety and economy in uneven terrain [PDF]

open access: yes, 2009
Cursorial ground birds are paragons of bipedal running that span a 500-fold mass range from quail to ostrich. Here we investigate the task-level control priorities of cursorial birds by analysing how they negotiate single-step obstacles that create a ...
Birn-Jeffery, A V   +6 more
core   +7 more sources

Finite-size effects for anisotropic bootstrap percolation: logarithmic corrections [PDF]

open access: yes, 2007
In this note we analyze an anisotropic, two-dimensional bootstrap percolation model introduced by Gravner and Griffeath. We present upper and lower bounds on the finite-size effects.
A. Holroyd   +28 more
core   +4 more sources

Key point detection method for fish size measurement based on deep learning

open access: yesIET Image Processing, 2023
Accurate fish size measurement in breeding areas is crucial for the fishing industry. Unlike acoustic methods with high equipment cost and low measurement accuracy, current image‐based methods offer a promising alternative.
Yaozhen Yu, Hao Zhang, Fei Yuan
doaj   +1 more source

Plant size: a key determinant of diversification? [PDF]

open access: yesNew Phytologist, 2017
SummaryExplaining the variation in diversification rate across groups of plants has long been an important goal of botanists. In plants, complex scenarios involving a combination of extrinsic opportunities and intrinsic traits have been used to explain rapid diversification in certain groups. However, we feel that a very simple trait has been neglected
Florian C, Boucher   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy