Results 211 to 220 of about 3,018,405 (324)
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing. [PDF]
Yang D, Tsai WT.
europepmc +1 more source
The impact of COVID‐19 on public perceptions of wild meat in Central Africa
Abstract Wild meat is a significant source of food and income generation in Central Africa. However, there is little knowledge of how the assumed link between COVID‐19 and wild meat consumption has been discussed by the media and received by the public. In this study, we conducted media content analysis of 264 articles published in 2019–2020 related to
Yuhan Li +14 more
wiley +1 more source
Enhanced quantum secret sharing protocol for anonymous secure communication utilizing W states. [PDF]
Li GD +5 more
europepmc +1 more source
Abstract Amid increasing urbanisation and biodiversity decline, ‘effective stewardship’ of urban green space (UGS) is a complex but critical nature‐based solution for long‐term environmental, social and economic gain. Combining stewardship and sense‐of‐place frameworks with European nature‐based solutions guidance, we investigate which social and ...
Fay Kahane +2 more
wiley +1 more source
Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning. [PDF]
Pereira D, Reis PR, Borges F.
europepmc +1 more source
Abstract The trade in exotic pets is a significant contributor to the unsustainable and sustainable trade of wildlife. The Convention on the International Trade in Endangered Species of Wild Fauna and Flora (CITES) aims to regulate sustainable wildlife trade.
Isabella Kortland, Amy Hinsley
wiley +1 more source
Secret Sharing of Encrypted Data Using a (k, n)-Scheme Based on Encrypted Blocks
V.A. Luzhetskyi, M.S. Tsikhotskyi
openalex +1 more source
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow [PDF]
Liaojun Pang +3 more
openalex +1 more source
Abstract The cultural ecosystem services (CES) framework allows to systematically analyse non‐material human–nature relationships and can help to increase the recognition and scope of various intangible place‐based values. Although the amount of scientific literature addressing CES has increased over the last few decades, studies largely focus only on ...
Jan Daněk +5 more
wiley +1 more source

