Results 81 to 90 of about 11,934 (254)
Hotspots, trends, and regional focus on oil or gas exploration: A bibliometric comparative study
This paper explores the research trends in global oil and gas exploration through the bibliometric analysis of 3460 articles collected from the Web of Science database on oil and gas exploration published from 2013 to 2023. The research hotspots, objects, regional distribution, methods, and evaluation methods of oil and gas exploration are analyzed and
Jihong Wang +3 more
wiley +1 more source
Based on acoustic emission response characteristics, it can be more accurate to identify the damage evolution process of coal under the combined dynamic and static loads, reveal the moment corresponding to coal damage, and identify the characteristics of coal failure. The research results are conducive to the further use of acoustic emission monitoring
Wei Zhang +10 more
wiley +1 more source
Upon conceptualization of structural behavior, foundations in terms of their form are divided into linear (1D), planar (2D), and volumetric (3D). Regarding the load transfer mechanisms, linear foundation systems are considered vector‐acting, planar foundations are divided into section and surface‐acting, and volumetric ones are recognized as block ...
Abolfazl Eslami +4 more
wiley +1 more source
In this article, the finite element method‐smoothed particle hydrodynamics adaptive coupling algorithm is applied to numerically simulate and analyze the dynamic response of the slit tube and the crack propagation under high in situ stress. The dynamic response of the slit tube mainly exhibits radial response in the vertical direction of the slit and ...
Zhe Sui +3 more
wiley +1 more source
Significant Secret Image Sharing Scheme Based on Boolean Operation
Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image.
Verma Monu, Rani Rajneesh
doaj +1 more source
The permeability variation of rocks during complete stress–strain processes was investigated. A mathematical model describing the influence of rock damage on permeability was constructed. The permeability–stress relationship between soft rock and hard rock was proposed.
Zhen Huang +6 more
wiley +1 more source
Counterfactual Quantum Secret Sharing
The emerging quantum technology has highlighted the necessity for secure and efficient secret sharing in quantum networks. In this paper, we introduce a verifiable multiparty counterfactual quantum secret sharing (QSS) protocol, enhancing security and efficiency. This QSS protocol utilizes a low-depth quantum circuit to encrypt and decrypt information,
Nomi Lae +6 more
openaire +2 more sources
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza +3 more
wiley +1 more source
Aiming at the scientific frontiers of in situ fluidized mining of deep resources, a deep coal fluidized pipeline lifting system based on hydraulic conveying has been proposed. To solve the issue of particle sedimentation of large particles in horizontal connection sections, a solution involving the installation of guide vane‐type swirlers in the ...
Jiusheng Bao +5 more
wiley +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
doaj +1 more source

