Results 121 to 130 of about 162,835 (326)

Sex Differences in Social, Health, and Lifestyle Characteristics Associated With Binge‐Eating Behaviors: Results From a French National Random Population‐Based Study

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective To explore sex differences in social, health and lifestyle characteristics associated with binge‐eating behaviors in a large population‐based study. Method This study included 84,995 participants (women 52.1%) aged ≥ 15 years from the French national random population‐based EpiCov cohort.
Junko Kose   +21 more
wiley   +1 more source

Over three‐quarters of earthworm species lack protection in China, a crisis exacerbated by climate change

open access: yesEcography, EarlyView.
Earthworms, as ‘ecosystem engineers', play a crucial role in regulating ecosystem functions and shaping community structures. Due to climate change, earthworms face severe survival pressures and extinction risks. However, whether conservation efforts targeting aboveground biodiversity can cover the long‐neglected earthworm diversity remains unknown. To
Yajie Zhou   +6 more
wiley   +1 more source

Conspiracy Theory Endorsement Profiles: A Cluster Validation Study

open access: yesEuropean Journal of Social Psychology, EarlyView.
ABSTRACT A substantial body of research has investigated the determinants of conspiratorial beliefs, yet little is known about different conspiracy theory endorsement profiles. The present study used cluster analysis on a set of 52 conspiratorial statements tapping into six conspiracy theory types to identify and validate conspiracy theory endorsement ...
Otto Mäki   +6 more
wiley   +1 more source

Stress Redistribution Mechanisms and Subsidence Control of Fluidized Gangue Backfilling in Underground Coal Mining: Integrated Experimental and Numerical Investigation

open access: yesEnergy Science &Engineering, EarlyView.
Fluidized gangue backfilling controls mining subsidence through stress redistribution in composite backfill‐pillar systems, reducing surface settlement and stress concentrations. Multi‐scale experimental and numerical analysis provides quantitative design parameters for optimizing ground control in sustainable underground coal mining operations ...
Weilong Zhang   +11 more
wiley   +1 more source

Interactive Verifiable Secret Sharing Scheme

open access: yesБезопасность информационных технологий, 2010
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered. Such schemes are one of the main computing primitives in the theory of secure computations.
O. V. Kazarin
doaj  

Caught in the fire: An accidental ethnography of discomfort in researching sex work

open access: yesFeminist Anthropology, EarlyView.
Abstract Drawing on fifteen years of engagement with researching Israel's sex industry, this article uses accidental ethnography to propose discomfort‐as‐method for feminist anthropology. I argue that discomfort is not a by‐product of fieldwork but a constitutive condition that disciplines researchers and shapes what can be known.
Yeela Lahav‐Raz
wiley   +1 more source

Interactive Verifiable Secret Sharing Scheme

open access: yesБезопасность информационных технологий, 2011
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered.
O.V. Kazarin
doaj  

Electricity Price Prediction Using Multikernel Gaussian Process Regression Combined With Kernel‐Based Support Vector Regression

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT This paper presents a new hybrid model for predicting German electricity prices. The algorithm is based on a combination of Gaussian process regression (GPR) and support vector regression (SVR). Although GPR is a competent model for learning stochastic patterns within data and for interpolation, its performance for out‐of‐sample data is not ...
Abhinav Das   +2 more
wiley   +1 more source

LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)

open access: yesIET Image Processing
In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold.
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

Quantum secret sharing schemes and reversibility of quantum operations [PDF]

open access: green, 2005
Tomohiro Ogawa   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy