Results 101 to 110 of about 112,314 (333)

Generic Secure Repair for Distributed Storage [PDF]

open access: yes, 2017
This paper studies the problem of repairing secret sharing schemes, i.e., schemes that encode a message into $n$ shares, assigned to $n$ nodes, so that any $n-r$ nodes can decode the message but any colluding $z$ nodes cannot infer any information about ...
Bruck, Jehoshua, Huang, Wentao
core   +2 more sources

Form and load transfer aspects of foundation systems: Case‐based implementation and adaptation for buildings

open access: yesDeep Underground Science and Engineering, EarlyView.
Upon conceptualization of structural behavior, foundations in terms of their form are divided into linear (1D), planar (2D), and volumetric (3D). Regarding the load transfer mechanisms, linear foundation systems are considered vector‐acting, planar foundations are divided into section and surface‐acting, and volumetric ones are recognized as block ...
Abolfazl Eslami   +4 more
wiley   +1 more source

Characterization of the permeability evolution of hard and soft rocks under hydro‐mechanical coupling conditions

open access: yesDeep Underground Science and Engineering, EarlyView.
The permeability variation of rocks during complete stress–strain processes was investigated. A mathematical model describing the influence of rock damage on permeability was constructed. The permeability–stress relationship between soft rock and hard rock was proposed.
Zhen Huang   +6 more
wiley   +1 more source

Secret Image Sharing Based on Encrypted Pixels

open access: yesIEEE Access, 2018
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou   +3 more
doaj   +1 more source

Geological and geotechnical challenges on the Great Dyke of Zimbabwe and their impact on hardrock pillar design

open access: yesDeep Underground Science and Engineering, EarlyView.
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza   +3 more
wiley   +1 more source

A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))

open access: yesCAAI Transactions on Intelligence Technology
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower

open access: yes, 2015
Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields.
Geil, Olav   +3 more
core  

Nonsilting transport characteristics of coal slurry in a deep underground fluidization conveying pipeline under the action of a guide vane swirler

open access: yesDeep Underground Science and Engineering, EarlyView.
Aiming at the scientific frontiers of in situ fluidized mining of deep resources, a deep coal fluidized pipeline lifting system based on hydraulic conveying has been proposed. To solve the issue of particle sedimentation of large particles in horizontal connection sections, a solution involving the installation of guide vane‐type swirlers in the ...
Jiusheng Bao   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy