Results 111 to 120 of about 112,587 (333)

A New Security Measure in Secret Sharing Schemes and Secure Network Coding

open access: yesIEEE Access
Linear secret sharing schemes protect secret information from leakage and destruction by encoding secret information into multiple shares, where the secret information can be reconstructed by collecting a certain subsets of shares.
Itaru Kurihara   +2 more
doaj   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

A review on rockburst prediction and prevention to shape an ontology‐based framework for better decision‐making for underground excavations

open access: yesDeep Underground Science and Engineering, EarlyView.
A scientometric analysis of 2449 journal articles and a comprehensive review of 336 papers were conducted, discussing and identifying challenges and research gaps in rockburst prediction and prevention and proposing an ontology‐based framework for better decision‐making in underground excavations. Abstract With underground engineering projects becoming
Hongchuan Yan   +6 more
wiley   +1 more source

Secret Image Sharing Based on Encrypted Pixels

open access: yesIEEE Access, 2018
The well-known Thien and Lin's (k, n) secret image sharing (SIS) scheme and its extended versions are threshold schemes, in which a secret image is shared among n shadow images and it can be recovered from any k shadow images.
Zhili Zhou   +3 more
doaj   +1 more source

Secret Sharing Schemes with a large number of players from Toric Varieties [PDF]

open access: yes, 2016
A general theory for constructing linear secret sharing schemes over a finite field $\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\geq 1$.
Hansen, Johan P.
core  

Semi‐analytical solution for the stability of deep vertical shaft considering time‐dependent rock‐structure interaction

open access: yesDeep Underground Science and Engineering, EarlyView.
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen   +5 more
wiley   +1 more source

A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))

open access: yesCAAI Transactions on Intelligence Technology
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

Strengthening urban resilience in China through underground infrastructures management: Addressing global climate challenges with technological solutions

open access: yesDeep Underground Science and Engineering, EarlyView.
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy