Results 81 to 90 of about 30,415 (268)

The Evolution of Wikipedia's Norm Network

open access: yes, 2016
Social norms have traditionally been difficult to quantify. In any particular society, their sheer number and complex interdependencies often limit a system-level analysis.
DeDeo, Simon, Heaberlin, Bradi
core   +2 more sources

Integrated Evaluation of Contaminant Profiles, Detection Techniques, and Management Strategies for Tannery Sludge

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT This review article critically examines the environmental and health hazards of tannery sludge (TS), a complex by‐product of the leather tanning industry. TS is characterized by a diverse array of contaminants, including heavy metals like chromium, organic pollutants such as polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds ...
Yashar Aryanfar   +10 more
wiley   +1 more source

SEAIS: Secure and Efficient Agricultural Image Storage Combining Blockchain and Satellite Networks

open access: yesMathematics
The image integrity of real-time monitoring is crucial for monitoring crop growth, helping farmers and researchers improve production efficiency and crop yields. Unfortunately, existing schemes just focus on ground equipment and drone imaging, neglecting
Haotian Yang   +4 more
doaj   +1 more source

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often ...
Zhidan Li   +4 more
doaj   +1 more source

Efficient Authenticated Encryption Schemes with Public Verifiability

open access: yes, 2004
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng   +3 more
core   +2 more sources

Information retrieval or document retrieval? Terminological confusions and unrealistic goals in information science, exemplified in relation to generative artificial intelligence

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley   +1 more source

Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication

open access: yesIEEE Access, 2019
A verifiable (t, n) threshold quantum secret sharing scheme with sequential communication was proposed recently. In this work, we analyze its security and then give two new participant attacks.
Xiaoqiu Cai   +3 more
doaj   +1 more source

Trust? No---verify [PDF]

open access: yesTobacco Control, 1999
Joe and his cartoon-character friends began populating advertisements for the Camel brand in the United States in 1988 and continued doing so for the next decade (figure 1). As described in a fawning retrospective produced for RJ Reynolds: “Between 1988 and 1997, the Joe Camel campaign was one of the most recognized ad campaigns in America, and that ...
openaire   +2 more sources

Risk‐aware safe reinforcement learning for control of stochastic linear systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili   +2 more
wiley   +1 more source

EXPLORING THE IMPACT OF ARTIFICIAL INTELLIGENCE ON FINANCIAL ACCOUNTING: OPPORTUNITIES, CHALLENGES, AND FUTURE DIRECTIONS

open access: yesФінансово-кредитна діяльність: проблеми теорії та практики
The main aim is to investigate the impact of Artificial Intelligence (AI) on various aspects of disclosing financial information. The case study used a mixed methods approach, and a sample of stakeholders dealing in the Iraq Stock Exchange was taken ...
Ali Khalaf Gatea
doaj   +1 more source

Home - About - Disclaimer - Privacy