Results 81 to 90 of about 11,914 (236)
Significant Secret Image Sharing Scheme Based on Boolean Operation
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj +1 more source
The permeability variation of rocks during complete stress–strain processes was investigated. A mathematical model describing the influence of rock damage on permeability was constructed. The permeability–stress relationship between soft rock and hard rock was proposed.
Zhen Huang +6 more
wiley +1 more source
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
Aiming at the scientific frontiers of in situ fluidized mining of deep resources, a deep coal fluidized pipeline lifting system based on hydraulic conveying has been proposed. To solve the issue of particle sedimentation of large particles in horizontal connection sections, a solution involving the installation of guide vane‐type swirlers in the ...
Jiusheng Bao +5 more
wiley +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
doaj +1 more source
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi +4 more
wiley +1 more source
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier. [PDF]
Krishna DP +6 more
europepmc +1 more source
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan +6 more
wiley +1 more source
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. [PDF]
Tian Y +5 more
europepmc +1 more source
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen +5 more
wiley +1 more source

