Results 81 to 90 of about 13,572 (291)
Fourier-based automatic alignment for improved visual cryptography schemes
International audienceIn Visual Cryptography, several images, called "shadow images", that separately contain no information, are overlapped to reveal a shared secret message. We develop a method to digitally register one printed shadow image acquired by
Chavel, Pierre +2 more
core +4 more sources
Fueling Tomorrow: Scenario Planning for the Future of Gas Stations
ABSTRACT Transport electrification is reshaping the service infrastructures that mediate everyday mobility, yet most electrification scenario studies remain macrolevel and offer limited insight into how incumbent forecourt (gas‐station) networks can adapt under deep uncertainty.
Joao Gabriel Rosa +2 more
wiley +1 more source
PQSF: post-quantum secure privacy-preserving federated learning
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang +4 more
doaj +1 more source
Механізм кодування та обробки інформації в системах із хаосом [PDF]
В комунікаційних системах хаос може використовуватися як носій інформації і як динамічний процес, що забезпечує перетворення інформації до нового вигляду.
Корнієнко, Богдан +1 more
core
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Оцінки ймовірностей узагальнених лінійних апроксимацій раундової функції ГОСТ-подібного блокового шифру [PDF]
Отримані аналітичні верхні межі ймовірностей узагальнених лінійних апроксимацій раундової функції ГОСТ-подібного блокового шифру, які залежать від певних числових параметрів його вузлів заміни.
Шевцов, Артур
core
Metasurface Enhanced Photothermal Cement Foam for Robust and High‐Throughput Seawater Desalination
Schematic of 3D metasurface‐enhanced cement foam for robust and high‐throughput seawater desalination. This study presents a cement‐based solar evaporator (CSE) fabricated in one step via viscoelastic lithography with simple negative pressure. In addition to boosting solar‐to‐vapor conversion efficiency via excellent light‐harvesting capacity, the ...
Jianjun Guo +4 more
wiley +1 more source
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT
Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8].
Anjaneyulu Endurthi +3 more
doaj
Rockburst prediction based on data preprocessing and hyperband‐RNN‐DNN
A data preprocessing workflow is proposed to address challenges in rockburst data analysis. Coupled algorithms preprocess the data set, and hyperband optimization is used to enhance RNN performance. Results show that preprocessing improves accuracy, while dense layers enhance model stability and prediction performance.
Yong Fan +4 more
wiley +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source

