Results 121 to 130 of about 162,835 (326)
ABSTRACT Objective To explore sex differences in social, health and lifestyle characteristics associated with binge‐eating behaviors in a large population‐based study. Method This study included 84,995 participants (women 52.1%) aged ≥ 15 years from the French national random population‐based EpiCov cohort.
Junko Kose +21 more
wiley +1 more source
Earthworms, as ‘ecosystem engineers', play a crucial role in regulating ecosystem functions and shaping community structures. Due to climate change, earthworms face severe survival pressures and extinction risks. However, whether conservation efforts targeting aboveground biodiversity can cover the long‐neglected earthworm diversity remains unknown. To
Yajie Zhou +6 more
wiley +1 more source
Conspiracy Theory Endorsement Profiles: A Cluster Validation Study
ABSTRACT A substantial body of research has investigated the determinants of conspiratorial beliefs, yet little is known about different conspiracy theory endorsement profiles. The present study used cluster analysis on a set of 52 conspiratorial statements tapping into six conspiracy theory types to identify and validate conspiracy theory endorsement ...
Otto Mäki +6 more
wiley +1 more source
Fluidized gangue backfilling controls mining subsidence through stress redistribution in composite backfill‐pillar systems, reducing surface settlement and stress concentrations. Multi‐scale experimental and numerical analysis provides quantitative design parameters for optimizing ground control in sustainable underground coal mining operations ...
Weilong Zhang +11 more
wiley +1 more source
Interactive Verifiable Secret Sharing Scheme
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered. Such schemes are one of the main computing primitives in the theory of secure computations.
O. V. Kazarin
doaj
Caught in the fire: An accidental ethnography of discomfort in researching sex work
Abstract Drawing on fifteen years of engagement with researching Israel's sex industry, this article uses accidental ethnography to propose discomfort‐as‐method for feminist anthropology. I argue that discomfort is not a by‐product of fieldwork but a constitutive condition that disciplines researchers and shapes what can be known.
Yeela Lahav‐Raz
wiley +1 more source
Interactive Verifiable Secret Sharing Scheme
Commitment schemes, secret sharing schemes, interactive zero-knowledge proofs which underlie the offered interactive secrete sharing schemes are considered.
O.V. Kazarin
doaj
ABSTRACT This paper presents a new hybrid model for predicting German electricity prices. The algorithm is based on a combination of Gaussian process regression (GPR) and support vector regression (SVR). Although GPR is a competent model for learning stochastic patterns within data and for interpolation, its performance for out‐of‐sample data is not ...
Abhinav Das +2 more
wiley +1 more source
LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)
In traditional secret image sharing schemes, shareholders have similar situations, and to recover the secret image, they must be present as many as the threshold.
Massoud Hadian Dehkordi +2 more
doaj +1 more source
Quantum secret sharing schemes and reversibility of quantum operations [PDF]
Tomohiro Ogawa +3 more
openalex +1 more source

