Results 171 to 180 of about 112,587 (333)

Hierarchical secure key assignment scheme. [PDF]

open access: yesPLoS One
Celiktas B   +3 more
europepmc   +1 more source

Lessons Learned From Using Simple Supervised Learning Tools on Small‐Ensemble Data—Applicability to Tunnel Design and Monitoring

open access: yesInternational Journal for Numerical and Analytical Methods in Geomechanics, EarlyView.
ABSTRACT Integrating interdisciplinary strategies with artificial intelligence (AI), particularly machine learning (ML), is an effective way of addressing urgent engineering challenges. Therefore, a thorough evaluation of existing methodologies is essential, taking into account their respective strengths, limitations and opportunities.
Lina‐María Guayacán‐Carrillo   +2 more
wiley   +1 more source

More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes

open access: gold, 2021
Leila Rashidi   +8 more
openalex   +1 more source

Analytical Modeling of Heat Transfer and Deformation Around a Circular Cavity in Elastic Ground

open access: yesInternational Journal for Numerical and Analytical Methods in Geomechanics, EarlyView.
ABSTRACT The subsurface is increasingly exploited to host energy, utilities, and infrastructure systems that interact with surrounding soils and rocks through their thermal and functional operation. Prominent examples are provided by energy geostructures, district heating networks, buried power cables, steam and water pipes, and underground nuclear ...
Arianna Lupattelli   +2 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Computationally secure threshold secret sharing scheme with minimal redundancy

open access: gold, 2020
Mikhail Babenko   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy