Results 61 to 70 of about 13,384 (274)
Recent Advances in Decoupling Strategies for Soft Sensors
This review provides an overview of recent advances in decoupling strategies for soft sensors. It summarizes single‐modal sensors that are insensitive to stretching, bending, crosstalk, and other environmental interferences, and highlights emerging multimodal decoupling methods enabled by spatiotemporal information and machine learning.
Yangbo Yuan +4 more
wiley +1 more source
Optimal Improvement Ratios of Multi-Secret Sharing Schemes Can Be Achieved
Secret sharing schemes (SSS) deal with activities relative to the secure distribution of a secret among a group of participants who then securely reconstruct the secret by collecting the shares which are held by individuals in qualified sets.
Juan Justie Su-Tzu +2 more
doaj +1 more source
Algorithms for multi-secret hierarchical sharing schemes of shamir type [PDF]
In this paper there are presented algorithms for multilevel hierarchical threshold secret sharing schemes based on the interpolation of Hermite type, which use either traditional Shamir's keys or polynomial and orthogonal polynomial keys.
Kapusta, Joanna, Smarzewski, Ryszard
core +2 more sources
This study introduces a novel metamaterial absorber integrating water as a lossy medium with patterned indium tin oxide (ITO) films to achieve simultaneous optical transparency and ultra‐wideband electromagnetic absorption over 0.52‐40 GHz. It effectively overcomes the limitations of conventional opaque and bulky shielding materials, offering a ...
Xiaojun Huang +5 more
wiley +1 more source
Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон +1 more
core
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P. +2 more
core +1 more source
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source
A volcano‐inspired dual‐carbon aerogel featuring hierarchical conduits and an outer carbon‐fiber shell directs rapid water transport, confines heat, and enables directional salt migration. Radial temperature gradients in the conical structure trigger Marangoni‐driven edge‐localized salt crystallization while maintaining an unobstructed photothermal ...
Shuyue Feng +8 more
wiley +1 more source
ABSTRACT Vending is an important sector in the daily lives of many people, and coffee is the most frequently consumed product in the European market. Like many other sectors, vending is responding to the challenge of sustainable development by taking various actions, such as offering increasingly ecologically sound coffee while maintaining/improving ...
Alberto Bertossi +2 more
wiley +1 more source
Multi-channel information encryption technology has been implemented by optical metasurfaces owing to their superior ability to control the phase, amplitude, wavelength and polarization of incident light.
Li Zhenfei, Premaratne Malin, Zhu Weiren
doaj +1 more source

