Results 91 to 100 of about 112,587 (333)
How wildlife respond to tropical cyclones: short‐term tactics and long‐term impacts
ABSTRACT From butterflies to lizards and from sharks to seabirds, wildlife exhibit tactics to survive the impacts of tropical cyclones, also known as hurricanes, cyclones, or typhoons depending on where they occur. Some species seek refuge during the storm by moving, some remain in place and ride it out, and others move longer distances, avoiding the ...
Erin L. Koen +15 more
wiley +1 more source
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Multiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier +4 more
core +1 more source
On Multiplicative Linear Secret Sharing Schemes [PDF]
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the Monotone Span Program (MSP), that is the result of local multiplication of shares distributed by two given MSPs as well as the access structure that this resulting MSP ...
Nikov, V.S., Nikova, S.I., Preneel, B.
openaire +1 more source
ABSTRACT Global net‐zero ambitions require transformative strategies to decarbonise carbon‐intensive global value chains (GVCs). This study examines how multinational enterprises (MNEs) in sunset industries integrate carbon capture technologies (CCT) with operational and supply chain dynamics (OSCD) to advance decarbonisation.
Muhammad Mustafa Kamal +6 more
wiley +1 more source
Accessing quantum secrets via local operations and classical communication
Quantum secret-sharing and quantum error-correction schemes rely on multipartite decoding protocols, yet the non-local operations involved are challenging and sometimes infeasible. Here we construct a quantum secret-sharing protocol with a reduced number
Gheorghiu, Vlad, Sanders, Barry C.
core +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Robust Secret Image Sharing Scheme Against Noise in Shadow Images [PDF]
Yuyuan Sun +4 more
openalex +1 more source
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley +1 more source
Study of secret sharing schemes based on quantum theory
Quantum secret sharing(QSS) which is based on the laws of quantum mechanics,instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into ...
ZHU Zhen-chao 1, ZHANG Yu-qing2
doaj +2 more sources

