Results 171 to 180 of about 162,835 (326)
ABSTRACT Integrating interdisciplinary strategies with artificial intelligence (AI), particularly machine learning (ML), is an effective way of addressing urgent engineering challenges. Therefore, a thorough evaluation of existing methodologies is essential, taking into account their respective strengths, limitations and opportunities.
Lina‐María Guayacán‐Carrillo +2 more
wiley +1 more source
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes
Leila Rashidi +8 more
openalex +1 more source
Analytical Modeling of Heat Transfer and Deformation Around a Circular Cavity in Elastic Ground
ABSTRACT The subsurface is increasingly exploited to host energy, utilities, and infrastructure systems that interact with surrounding soils and rocks through their thermal and functional operation. Prominent examples are provided by energy geostructures, district heating networks, buried power cables, steam and water pipes, and underground nuclear ...
Arianna Lupattelli +2 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Computationally secure threshold secret sharing scheme with minimal redundancy
Mikhail Babenko +4 more
openalex +1 more source
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
Reversible data hiding in encrypted images using LWE-based secret sharing. [PDF]
Saeidi Z, Mirzakuchaki S.
europepmc +1 more source
Visual Secret Sharing Scheme Using Encrypting Multiple Images
Isha Padiya +2 more
openalex +1 more source
Alpine flora of Kashmir Himalaya: floristic assessment, life history traits and threat status
Alpine ecosystems in the Himalaya are considered to be at a higher risk to anthropogenic global change drivers. The Kashmir Himalaya, located in the north‐western side of the Himalayan biodiversity hotspot, harbors a diverse alpine flora, which remains systematically little investigated.
Bilal A. Rasray +5 more
wiley +1 more source
Research on key technologies for privacy-preserving, regulatorily compliant, and cross-chain interoperability in heterogeneous blockchain systems. [PDF]
Chen Z, Liu H, Zhang L, Dai B, Shi Y.
europepmc +1 more source

