Results 101 to 110 of about 13,384 (274)
Strain‐based modeling and analysis for rock blasting and geomechanics applications
This paper introduces a novel strain‐based modeling approach for blasting and geomechanical applications, using measurable variables like particle velocity, strain, and displacement. By bypassing complex constitutive relations, strain‐based models capture critical blasting trends and full‐blast design parameters with minimal calibration.
Ruilin Yang
wiley +1 more source
Interference alignment based secure transmission scheme in multi-user interference networks
Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was ...
Lin HU +4 more
doaj +2 more sources
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side ...
Aesun Park +3 more
doaj +1 more source
Verifiable multi-secret sharing based on LFSR sequences
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hu, Chunqiang +2 more
openaire +1 more source
Rockburst prediction based on data preprocessing and hyperband‐RNN‐DNN
A data preprocessing workflow is proposed to address challenges in rockburst data analysis. Coupled algorithms preprocess the data set, and hyperband optimization is used to enhance RNN performance. Results show that preprocessing improves accuracy, while dense layers enhance model stability and prediction performance.
Yong Fan +4 more
wiley +1 more source
Ideal Tightly Couple (t,m,n) Secret Sharing
As a fundamental cryptographic tool, (t,n)-threshold secret sharing ((t,n)-SS) divides a secret among n shareholders and requires at least t, (t=t), participants into a tightly coupled group and requires all participants to be legal shareholders before ...
Huang, Wenchao +4 more
core
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares. However, the traditional scheme suffers from information leakage in decryption process since the amount of available ...
Keyao Li +8 more
doaj +1 more source
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan +6 more
wiley +1 more source
This study investigates ground subsidence during tunnel excavation in karst areas, highlighting the combined effects of karst cave proximity, cave size, and soil spatial variability. Findings suggest that shorter cave distances and larger cave sizes increase subsidence variability, and a modified Peck formula is proposed for more accurate subsidence ...
Zhenghong Su +4 more
wiley +1 more source

