Our research allows us to understand the predictors of extinction risk in traditional Chinese medicinal (TCM) plant species with known threat status, and incorporate this knowledge to predict other TCM plants with unknown conservation status in China so as to improve the overall effectiveness of conservation strategies.
Yuhan Zheng +4 more
wiley +1 more source
Group verifiable secure aggregate federated learning based on secret sharing. [PDF]
Zhou S, Wang L, Chen L, Wang Y, Yuan K.
europepmc +1 more source
Farmer‐Led Strategies for Water Conservation in the Urmia Lake Basin, Iran
ABSTRACT This study examines the urgent issues of water scarcity and limited farmer livelihoods in the Urmia Lake basin. To address these challenges, we apply the Governance, Autonomy, Integration, and Needs orientation (GAIN) methodology. Our participatory approach revealed that farmers prioritised actionable measures for water management, yield ...
Sina Besharat +20 more
wiley +1 more source
Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach. [PDF]
Kumar P +5 more
europepmc +1 more source
Caught in the Loop: Basic Psychological Need Frustration and Conspiracy Mentality in Adolescence
ABSTRACT Introduction Conspiracy mentality has been associated with various detrimental societal outcomes. However, research on its predictors and consequences has been focused almost exclusively on adults. Guided by Self‐Determination Theory, this study examined reciprocal associations between basic psychological need frustration and conspiracy ...
Anne‐Sophie Denault +3 more
wiley +1 more source
Conjunctive hierarchical secret sharing by finite geometry. [PDF]
Gyarmati M +3 more
europepmc +1 more source
Yes, Friendship and Love Can Be Bought and Sold
ABSTRACT Can friendship and love be bought and sold? I argue yes, contrary to philosophical consensus. The prevailing view rests on the common error of over‐reliance on idealized conceptions of friendship and love that bear little resemblance to actual relationships.
Simone Sommer Degn
wiley +1 more source
Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits. [PDF]
Cai XQ, Li S, Liu ZF, Wang TY.
europepmc +1 more source
The Non‐Professional Virtues of the Hospice Volunteer
ABSTRACT Volunteers have long played a significant role in hospice care. Much of the care volunteers provide consists of weekly hour‐long in‐home visits. Home‐visiting hospice volunteers are not professionals, nor are they strangers or intimates. Hospice volunteers will not typically face moral dilemmas, nor be called upon to make dramatic decisions ...
Michael B. Gill
wiley +1 more source
An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing. [PDF]
Yang D, Tsai WT.
europepmc +1 more source

