Results 91 to 100 of about 211,108 (260)

Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms

open access: yesOpto-Electronic Advances
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares. However, the traditional scheme suffers from information leakage in decryption process since the amount of available ...
Keyao Li   +8 more
doaj   +1 more source

Study on Damage Characteristics and Evolution Law of Macro‐Meso Structure of Surrounding Rock Under Mining Stress

open access: yesEnergy Science &Engineering, EarlyView.
Investigating the differential impact of mining stress on roadways, we find that in horizontally stressed environments, the inner surrounding rock exhibits more pronounced macro‐meso damage compared to the outer side. ABSTRACT The control of surrounding rocks in dynamic pressure roadways has consistently been one of the challenging predicaments in the ...
Fan Lei   +4 more
wiley   +1 more source

Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead

open access: yesJournal of King Saud University: Computer and Information Sciences
Secret image sharing (SIS) possesses advantageous attributes such as loss tolerance, offering a promising solution for image protection. However, the issue remains unresolved, which is the trade-off between the transmission or storage overhead of shadow ...
Guozheng Yang   +4 more
doaj   +1 more source

Оптимальные протоколы множественного разделения секрета с многоадресным сообщением, основанные на линейных преобразованиях над кольцами вычетов [PDF]

open access: yes, 2009
Отримані достатні умови оптимальності (за критерієм максимуму інформаційних відношень) протоколів множинного розподілу секрету з багатоадресним повідомленням, що реалізують певні ієрархії доступу.
Алексейчук, Антон   +1 more
core  

Machine Learning Approaches for GC–MS Data Interpretation in Flavour and Fragrance Analysis

open access: yesFlavour and Fragrance Journal, EarlyView.
The review explores machine learning integration in GC‐MS data analysis for the fragrance and flavour industry, highlighting recent advances and techniques in a context constrained by data scarcity and intellectual property concerns. ABSTRACT This review explores the integration of machine learning (ML) in the analysis of mass spectrometry data ...
Jean‐Baptiste Coffin   +3 more
wiley   +1 more source

Efficient Multi Secret Sharing with Generalized Access Structures

open access: yesInternational Journal of Computer Applications, 2014
arXiv admin note: substantial text overlap with arXiv:1406.5596, arXiv:1407 ...
Binu, V. P., Sreekumar, A.
openaire   +2 more sources

Multifactorial Screening for Fine‐Scale Selection of CCS Industrial Clusters and Hubs in Brazil

open access: yesGreenhouse Gases: Science and Technology, EarlyView.
ABSTRACT As Brazil moves toward implementing its decarbonization commitments, carbon capture and storage (CCS) hubs are emerging as a key pathway for large‐scale CO2 abatement in hard‐to‐abate sectors. This paper presents a multifactorial, data‐driven framework to screen and prioritize potential CCS industrial clusters and hubs across Brazilian regions,
Gustavo P. Oliveira   +5 more
wiley   +1 more source

How Signals of Silence Sustain Sexual Harassment and What to Do About It

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Sexual harassment has persisted for decades as an open secret within organizations, creating an ongoing challenge for Human Resource practitioners. Many employees experience or witness harassment yet say nothing. When they contemplate complaining, they are discouraged from doing so. Some still muster the courage to speak out about these abuses,
Angela L. Workman‐Stark   +6 more
wiley   +1 more source

Tailoring Spatial Correlations With Quantum Interference

open access: yesLaser &Photonics Reviews, EarlyView.
Imposing spatial structure on interfering photons fundamentally reshapes their correlations. By controlling the mutual distinguishability of two photons, we write and edit these correlations, encoding information that is invisible to conventional intensity measurements and revealed only through their joint behavior.
Carlo Schiano   +5 more
wiley   +1 more source

Sillcom: A Communication-Efficient Privacy-Preserving Scheme for Indoor Localization

open access: yesApplied Sciences
This paper presents Sillcom, a high-performance secure indoor localization scheme designed to minimize both communication and computational costs while preserving participants’ privacy.
Shang Song, Lin Liu, Wei Peng
doaj   +1 more source

Home - About - Disclaimer - Privacy