Results 71 to 80 of about 13,572 (291)

Multi‐Method Geophysical Surveys Between and Around the Kerlescan and the Manio Megalithic Alignments in Carnac (Morbihan, France)

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT The Carnac alignments in Morbihan (France) are among the most famous Neolithic sites of the world. Paradoxically, they have benefited little from a thorough renewal of archaeological data over the past century. There are many reasons for this, but it is mainly because the site has been regarded more as a monument to visit and protect than as ...
Guillaume Bruniaux   +6 more
wiley   +1 more source

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead

open access: yesJournal of King Saud University: Computer and Information Sciences
Secret image sharing (SIS) possesses advantageous attributes such as loss tolerance, offering a promising solution for image protection. However, the issue remains unresolved, which is the trade-off between the transmission or storage overhead of shadow ...
Guozheng Yang   +4 more
doaj   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication

open access: yesIEEE Access, 2020
Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance.
David Samuel Bhatti, Shahzad Saleem
doaj   +1 more source

Innovating for Net‐Zero: Collaborative and Digital Decarbonisation Strategies in Sunset Industries' Global Value Chains

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Global net‐zero ambitions require transformative strategies to decarbonise carbon‐intensive global value chains (GVCs). This study examines how multinational enterprises (MNEs) in sunset industries integrate carbon capture technologies (CCT) with operational and supply chain dynamics (OSCD) to advance decarbonisation.
Muhammad Mustafa Kamal   +6 more
wiley   +1 more source

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

Improving Multi-pixel Visual Quality of Invariant Visual Cryptography Scheme

open access: yesInternational Journal of Computational Intelligence Systems
A visual cryptography scheme (VCS) splits the secret image into several shares. Stacking a certain number of shares will reveal the secret image. The principle algorithm (deterministic algorithm) retains the size of shares, and the revealed image is at ...
Maged Wafy
doaj   +1 more source

Линейный стохастический алгоритм шифрования, базирующийся на каноническом разложении случайной последовательности [PDF]

open access: yes, 2007
Розглянуто метод шифрування, який дозволяє перетворити повідомлення, що передається, в послідовність некорельованих значень, що суттєво ускладнює задачу відтворення початкових даних. Алгоритм базується на канонічному розкладі випадкової послідовності, що
Атаманюк, Игорь
core  

Home - About - Disclaimer - Privacy