We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 853 results
  1. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter

    In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k...

    Massoud Hadian Dehkordi, Samaneh Mashhadi, ... Mohommad Hosein Noorallahzadeh in Multimedia Tools and Applications
    Article 27 December 2023
  2. A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor

    Secret sharing (SS) is part of the essential techniques in cryptography but still faces many challenges in efficiency and security. Currently, SS...

    Lei Wu, Fuyou Miao, ... Xu Wang in Frontiers of Computer Science
    Article 19 October 2021
  3. Multilevel thresholding for image segmentation with exchange market algorithm

    Image segmentation is the prime factor to elicit the detailed investigation of an image. The desired information from an image can be easily obtained...

    R. Kalyani, P. D. Sathya, V. P. Sakthivel in Multimedia Tools and Applications
    Article 21 May 2021
  4. Financial Distress Prediction with a Novel Diversity-Considered GA-MLP Ensemble Algorithm

    An effective financial distress prediction model is essential, as financial distress of listed companies will cause big problems for listed company...

    Rui Zhang, Zuoquan Zhang, ... Marui Du in Neural Processing Letters
    Article 01 November 2021
  5. Improve data classification performance in diagnosing diabetes using the Binary Exchange Market Algorithm

    Today's lifestyle has led to a significant increase in referrals to medical centers to diagnose various diseases. To this end, over the past few...

    Faranak Rezaei, Maryam Abbasitabar, ... Darya Danialy in Journal of Big Data
    Article Open access 25 April 2022
  6. Efficient collusion resistant multi-secret image sharing

    Multi-secret image sharing techniques (MSS) extend the secret image sharing schemes. The paper reports a novel MSS scheme designed to be collusion...

    Kapil Mishra, Sannihith Kavala, ... P. Nagabhushan in Multimedia Tools and Applications
    Article 31 August 2020
  7. Data Analysis for Predicting Stock Prices Using Financial Indicators Based on Business Reports

    Increased access to the stock market leads to a growing interest in investing and an increase in the number of new investors. However, investing in...
    Conference paper 2023
  8. Enhancing stock market prediction using three-phase classifier and EM-EPO optimization with news feeds and historical data

    Stock price forecasting is a crucial area of research that demands a thorough comprehension of market dynamics and sophisticated analytical methods....

    Shilpa Dixit, Nitasha Soni in Multimedia Tools and Applications
    Article 02 October 2023
  9. Network Analysis for Economics and Finance: An Application to Firm Ownership

    In this chapter, we introduce network analysis as an approach to model data in economics and finance. First, we review the most recent empirical...
    Janina Engel, Michela Nardo, Michela Rancan in Data Science for Economics and Finance
    Chapter Open access 2021
  10. On the use of generic types for smart contracts

    This paper shows that generic types ( generics ) are useful for writing more abstract and more general smart contracts, but this comes with some...

    Fausto Spoto, Sara Migliorini, ... Andrea Benini in Cluster Computing
    Article Open access 09 August 2022
  11. Stock prediction analysis by customers opinion in Twitter data using an optimized intelligent model

    The earlier prediction of stock based on sentiment analysis is an essential factor in the finance-based intersection. However, the stock details...

    Tareek Pattewar, Dinesh Jain in Social Network Analysis and Mining
    Article 13 October 2022
  12. A Modeling Tool for Exploring Business Ecosystems in a (Pre-)conceptual Phase

    When modeling real-world activities involving social, economic, and technical aspects, conceptual modeling is a necessary prerequisite to set the...
    Florian Schierlinger-Brandmayr, Birgit Moesl, ... Siegfried Vössner in Domain-Specific Conceptual Modeling
    Chapter 2022
  13. The Courts Are Picking Up the Cyber Pace

    There is an emergence of a de facto legal “standard of care” related to cyber risk management. This chapter highlights several foundational and...
    Chapter 2024
  14. A homomorphic computational model for Chinese remainder theorem-based secret sharing

    This paper proposes a fully homomorphic computational model for secret sharing. The backbone of the proposed model is Chinese remainder theorem. The...

    Article 08 October 2019
  15. Enhanced block based progressive visual secret sharing scheme for grayscale and color image

    Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS)...

    Vishal V. Panchbhai, Suchita W. Varade in Multimedia Tools and Applications
    Article 07 November 2023
  16. Autoencoder as Feature Extraction Technique for Financial Distress Classification

    Financial statements are typical financial distress identification data for the enterprise. However, nowadays, the valuable data source...
    Dovilė Kuizinienė, Paulius Savickas, Tomas Krilavičius in Information and Software Technologies
    Conference paper 2024
  17. Smart Financial Investor’s Risk Prediction System Using Mobile Edge Computing

    The financial system has reached its pinnacle because of economic and social growth, which has propelled the financial sector into another era....

    Caijun Cheng, Huazhen Huang in Journal of Grid Computing
    Article 04 December 2023
  18. Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability

    The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private...

    B. A. Kamphorst, A. Henschke in Ethics and Information Technology
    Article Open access 16 November 2023
  19. Mobile Agent Security Using Lagrange Interpolation with Multilayer Perception Neural Network

    Mobile agents are an emerging computing area which replaces client server computing model. Mobile agents are small piece of code and data works...
    Pradeep Kumar, Niraj Singhal, ... Mahboob Alam in Advances in Computing and Data Sciences
    Conference paper 2021
  20. Integration of Blockchain for securing the transactions in Supply Chain Management

    Blockchain is a progressive technology in many applications, such as supply chain management. Blockchain technology is gaining attention due to its...

    R. Dhivya, J. Senthil Kumar, ... Rengarajan Amirtharajan in Multimedia Tools and Applications
    Article 10 June 2024
Did you find what you were looking for? Share feedback.