Results 141 to 150 of about 112,587 (333)

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES [PDF]

open access: yes
Visual secret sharing schemes (VSS) represent an important concept of visual cryptography. They permit the sharing of a secret image between multiple participants so that only authorized groups can recover the secret.
Ruxandra Olimid
core  

Electricity Price Prediction Using Multikernel Gaussian Process Regression Combined With Kernel‐Based Support Vector Regression

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT This paper presents a new hybrid model for predicting German electricity prices. The algorithm is based on a combination of Gaussian process regression (GPR) and support vector regression (SVR). Although GPR is a competent model for learning stochastic patterns within data and for interpolation, its performance for out‐of‐sample data is not ...
Abhinav Das   +2 more
wiley   +1 more source

Secret sharing in a special linear group

open access: yesInformatika
Objectives. The problem of developing the mathematical foundations of modular secret sharing in a special linear group over the ring of integers is being solved.The relevance of the problem is reduced to the fact that a large number of requirements are ...
V. I. Yanchevskiĭ   +2 more
doaj   +1 more source

Probabilistic Infinite Secret Sharing

open access: yes, 2013
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core  

Quantum secret sharing schemes and reversibility of quantum operations [PDF]

open access: green, 2005
Tomohiro Ogawa   +3 more
openalex   +1 more source

Multifactorial Screening for Fine‐Scale Selection of CCS Industrial Clusters and Hubs in Brazil

open access: yesGreenhouse Gases: Science and Technology, EarlyView.
ABSTRACT As Brazil moves toward implementing its decarbonization commitments, carbon capture and storage (CCS) hubs are emerging as a key pathway for large‐scale CO2 abatement in hard‐to‐abate sectors. This paper presents a multifactorial, data‐driven framework to screen and prioritize potential CCS industrial clusters and hubs across Brazilian regions,
Gustavo P. Oliveira   +5 more
wiley   +1 more source

Developing a Typology of Korean Women Leaders' Resistance to Their Token Status in the Workplace

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite remarkable economic development in South Korea (Korea), there are only a few women leaders, and they face challenges in the gendered workplace where organizational constraints and traditional values coexist. In a reanalysis of narratives of Korean women leaders (KWLs), using an ideal‐type analysis as a novel qualitative research method,
Yonjoo Cho   +4 more
wiley   +1 more source

An Efficient Framework for Secure Image Archival and Retrieval System Using Multiple Secret Share Creation Scheme [PDF]

open access: gold, 2020
A. Francis Saviour Devaraj   +6 more
openalex   +1 more source

How Signals of Silence Sustain Sexual Harassment and What to Do About It

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Sexual harassment has persisted for decades as an open secret within organizations, creating an ongoing challenge for Human Resource practitioners. Many employees experience or witness harassment yet say nothing. When they contemplate complaining, they are discouraged from doing so. Some still muster the courage to speak out about these abuses,
Angela L. Workman‐Stark   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy