Search
Search Results
-
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter
In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k...
-
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
Secret sharing (SS) is part of the essential techniques in cryptography but still faces many challenges in efficiency and security. Currently, SS...
-
Multilevel thresholding for image segmentation with exchange market algorithm
Image segmentation is the prime factor to elicit the detailed investigation of an image. The desired information from an image can be easily obtained...
-
Financial Distress Prediction with a Novel Diversity-Considered GA-MLP Ensemble Algorithm
An effective financial distress prediction model is essential, as financial distress of listed companies will cause big problems for listed company...
-
Improve data classification performance in diagnosing diabetes using the Binary Exchange Market Algorithm
Today's lifestyle has led to a significant increase in referrals to medical centers to diagnose various diseases. To this end, over the past few...
-
Efficient collusion resistant multi-secret image sharing
Multi-secret image sharing techniques (MSS) extend the secret image sharing schemes. The paper reports a novel MSS scheme designed to be collusion...
-
Data Analysis for Predicting Stock Prices Using Financial Indicators Based on Business Reports
Increased access to the stock market leads to a growing interest in investing and an increase in the number of new investors. However, investing in... -
Enhancing stock market prediction using three-phase classifier and EM-EPO optimization with news feeds and historical data
Stock price forecasting is a crucial area of research that demands a thorough comprehension of market dynamics and sophisticated analytical methods....
-
Network Analysis for Economics and Finance: An Application to Firm Ownership
In this chapter, we introduce network analysis as an approach to model data in economics and finance. First, we review the most recent empirical... -
On the use of generic types for smart contracts
This paper shows that generic types ( generics ) are useful for writing more abstract and more general smart contracts, but this comes with some...
-
Stock prediction analysis by customers opinion in Twitter data using an optimized intelligent model
The earlier prediction of stock based on sentiment analysis is an essential factor in the finance-based intersection. However, the stock details...
-
A Modeling Tool for Exploring Business Ecosystems in a (Pre-)conceptual Phase
When modeling real-world activities involving social, economic, and technical aspects, conceptual modeling is a necessary prerequisite to set the... -
The Courts Are Picking Up the Cyber Pace
There is an emergence of a de facto legal “standard of care” related to cyber risk management. This chapter highlights several foundational and... -
A homomorphic computational model for Chinese remainder theorem-based secret sharing
This paper proposes a fully homomorphic computational model for secret sharing. The backbone of the proposed model is Chinese remainder theorem. The...
-
Enhanced block based progressive visual secret sharing scheme for grayscale and color image
Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS)...
-
Autoencoder as Feature Extraction Technique for Financial Distress Classification
Financial statements are typical financial distress identification data for the enterprise. However, nowadays, the valuable data source... -
Smart Financial Investor’s Risk Prediction System Using Mobile Edge Computing
The financial system has reached its pinnacle because of economic and social growth, which has propelled the financial sector into another era....
-
Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability
The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private...
-
Mobile Agent Security Using Lagrange Interpolation with Multilayer Perception Neural Network
Mobile agents are an emerging computing area which replaces client server computing model. Mobile agents are small piece of code and data works... -
Integration of Blockchain for securing the transactions in Supply Chain Management
Blockchain is a progressive technology in many applications, such as supply chain management. Blockchain technology is gaining attention due to its...