Results 181 to 190 of about 112,587 (333)
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
Alpine flora of Kashmir Himalaya: floristic assessment, life history traits and threat status
Alpine ecosystems in the Himalaya are considered to be at a higher risk to anthropogenic global change drivers. The Kashmir Himalaya, located in the north‐western side of the Himalayan biodiversity hotspot, harbors a diverse alpine flora, which remains systematically little investigated.
Bilal A. Rasray +5 more
wiley +1 more source
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control. [PDF]
Pan H, Yan W, Wang R, Yu Y.
europepmc +1 more source
An Easy-to-implement Construction for $(k,n)$-threshold Progressive Visual Secret Sharing Schemes [PDF]
Hongbin Chen +2 more
openalex +1 more source
Abstract A better understanding of the near‐surface aquifer system of the Caxambu Water Park, located in the Minas Gerais State, Brazil, has been achieved. The study aimed to identify groundwater reservoirs and flow patterns and contribute to the hydrogeological conceptual model using a multi‐scale geophysical approach.
Emanuele F. La Terra +5 more
wiley +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
Visual Secret Sharing Scheme Using Encrypting Multiple Images
Isha Padiya +2 more
openalex +1 more source
Nonperfect secret sharing scheme
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
ABSTRACT Two conceptualizations of pathways to moderating power asymmetries in humanitarian practice have emerged in localization discourse—one emphasizing procedural reforms and the other highlighting relational transformation. Dominant Global North‐mediated localization frameworks emphasize procedural approaches with a focus on shifting to a direct ...
Meghan Sullivan
wiley +1 more source
A novel cryptographic framework and mathematical modeling for secure transmission of Parkinson's disease data using RSA and block-based secret sharing. [PDF]
Sambandham T +5 more
europepmc +1 more source

