Results 81 to 90 of about 30,415 (268)
The Evolution of Wikipedia's Norm Network
Social norms have traditionally been difficult to quantify. In any particular society, their sheer number and complex interdependencies often limit a system-level analysis.
DeDeo, Simon, Heaberlin, Bradi
core +2 more sources
ABSTRACT This review article critically examines the environmental and health hazards of tannery sludge (TS), a complex by‐product of the leather tanning industry. TS is characterized by a diverse array of contaminants, including heavy metals like chromium, organic pollutants such as polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds ...
Yashar Aryanfar +10 more
wiley +1 more source
SEAIS: Secure and Efficient Agricultural Image Storage Combining Blockchain and Satellite Networks
The image integrity of real-time monitoring is crucial for monitoring crop growth, helping farmers and researchers improve production efficiency and crop yields. Unfortunately, existing schemes just focus on ground equipment and drone imaging, neglecting
Haotian Yang +4 more
doaj +1 more source
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often ...
Zhidan Li +4 more
doaj +1 more source
Efficient Authenticated Encryption Schemes with Public Verifiability
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng +3 more
core +2 more sources
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley +1 more source
Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication
A verifiable (t, n) threshold quantum secret sharing scheme with sequential communication was proposed recently. In this work, we analyze its security and then give two new participant attacks.
Xiaoqiu Cai +3 more
doaj +1 more source
Joe and his cartoon-character friends began populating advertisements for the Camel brand in the United States in 1988 and continued doing so for the next decade (figure 1). As described in a fawning retrospective produced for RJ Reynolds: “Between 1988 and 1997, the Joe Camel campaign was one of the most recognized ad campaigns in America, and that ...
openaire +2 more sources
Risk‐aware safe reinforcement learning for control of stochastic linear systems
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili +2 more
wiley +1 more source
The main aim is to investigate the impact of Artificial Intelligence (AI) on various aspects of disclosing financial information. The case study used a mixed methods approach, and a sample of stakeholders dealing in the Iraq Stock Exchange was taken ...
Ali Khalaf Gatea
doaj +1 more source

