Results 71 to 80 of about 13,384 (274)
Secret image sharing (SIS) possesses advantageous attributes such as loss tolerance, offering a promising solution for image protection. However, the issue remains unresolved, which is the trade-off between the transmission or storage overhead of shadow ...
Guozheng Yang +4 more
doaj +1 more source
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source
Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance.
David Samuel Bhatti, Shahzad Saleem
doaj +1 more source
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston +5 more
wiley +1 more source
Key distribution and recovery algorithm based on Shamir's secret sharing
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG +4 more
doaj +2 more sources
Improving Multi-pixel Visual Quality of Invariant Visual Cryptography Scheme
A visual cryptography scheme (VCS) splits the secret image into several shares. Stacking a certain number of shares will reveal the secret image. The principle algorithm (deterministic algorithm) retains the size of shares, and the revealed image is at ...
Maged Wafy
doaj +1 more source
ABSTRACT The Carnac alignments in Morbihan (France) are among the most famous Neolithic sites of the world. Paradoxically, they have benefited little from a thorough renewal of archaeological data over the past century. There are many reasons for this, but it is mainly because the site has been regarded more as a monument to visit and protect than as ...
Guillaume Bruniaux +6 more
wiley +1 more source
PQSF: post-quantum secure privacy-preserving federated learning
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang +4 more
doaj +1 more source
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source

