Results 71 to 80 of about 112,587 (333)

Technobiological Pathways for High‐CO₂ Capture Using Micro‐/Macroalgae: Genetic Engineering, Process Automation, and Value‐Added Bioproducts

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Greenhouse gas (GHG) emissions have emerged as one of the most critical drivers of climate change; this is primarily due to high concentrations and long atmospheric life of carbon dioxide (CO2). For a significant amount of time, various biological processes such as microalgal cultivation, cyanobacterial systems, photosynthetic microorganisms ...
Sadhana Semwal, Harish Chandra Joshi
wiley   +1 more source

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

open access: yesAxioms
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares ...
Irfan Alam   +3 more
doaj   +1 more source

Revisiting paravertebral muscles in European rabbits (Oryctolagus cuniculus) and European brown hares (Lepus europaeus) (Leporidae; Lagomorpha)

open access: yesThe Anatomical Record, EarlyView.
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen   +3 more
wiley   +1 more source

On secret sharing schemes, matroids and polymatroids

open access: yesJournal of Mathematical Cryptology, 2010
The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for general access structures is an important and very difficult open problem in ...
Martí-Farré Jaume, Padró Carles
doaj   +1 more source

Correction to: A lossless secret image sharing scheme using a larger finite field [PDF]

open access: bronze, 2022
Weitong Hu   +4 more
openalex   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Randomness Recoverable Secret Sharing Schemes

open access: yesJournal of Cryptology
The present article deals with the case study of particular models of sharing secrets as well as modal schemes treated from the informational-theoretical and computational perspectives. The main novelty brought by the authors refers to the demonstration of the conclusion that access structures can be treated with RR-SSS.
Hajiabadi, Mohammad   +2 more
openaire   +4 more sources

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Anonymous secret sharing schemes

open access: yesDiscrete Applied Mathematics, 1997
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blundo, C., Stinson, D.R.
openaire   +2 more sources

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy