Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Structural topology optimization considering casting and stress constraints under uniform dimensional shrinkage
Advances in Engineering Software (ADES), Volume 195, Issue Chttps://doi.org/10.1016/j.advengsoft.2024.103692Highlights- Stress, castability, and dimensional shrinkage are treated together.
- The stress control in the twin designs is implemented simultaneously.
- The castability in the twin designs is realized simultaneously.
- An efficient formulation ...
This work proposes and investigates a new multi-field-multi-constraint coupled topology optimization problem, in which stress control, design castability, and geometry dimensional shrinkage issues that are of concern to practical engineering are ...
SecretFlow-SCQL: A Secure Collaborative Query Platform
- Wenjing Fang,
- Shunde Cao,
- Guojin Hua,
- Junming Ma,
- Yongqiang Yu,
- Qunshan Huang,
- Jun Feng,
- Jin Tan,
- Xiaopeng Zan,
- Pu Duan,
- Yang Yang,
- Li Wang,
- Ke Zhang,
- Lei Wang
Proceedings of the VLDB Endowment (PVLDB), Volume 17, Issue 12Pages 3987–4000https://doi.org/10.14778/3685800.3685821In the business scenarios at Ant Group, there is a rising demand for collaborative data analysis among multiple institutions, which can promote health insurance, financial services, risk control, and others. However, the increasing concern about privacy ...
- research-articleMay 2023
Secret image sharing scheme with lossless recovery and high efficiency
Highlights- A (k , n)-threshold SIS scheme with lossless recovery and high efficiency is proposed.
As a well-known secret image sharing scheme, Thien-and-Lin’s scheme generates shadow images of reduced size, which is beneficial for storage, transmission, and processing. However, it has some drawbacks, such as lossy recovery, needing ...
- research-articleJanuary 2023
LICOM3-CUDA: a GPU version of LASG/IAP climate system ocean model version 3 based on CUDA
- research-articleMay 2022
Renewal of secret and shadows in secret image sharing
AbstractSecret image sharing (SIS) is an important method to protect the security of secret images. When part of the shadows generated by the secret sharing is leaked or when the secret image is restored, the shadows and the secret need to be renewed. ...
- ArticleAugust 2021
PT-LSTM: Extending LSTM for Efficient Processing Time Attributes in Time Series Prediction
AbstractLong Short-Term Memory (LSTM) has been widely applied in time series predictions. Time attributes are important factors in time series prediction. However, existing studies often ignore the influence of time attributes when splitting the time ...
- research-articleJanuary 2021
An Intragroup and Intergroup Multiple Secret Images’ Sharing Scheme with Each Participant Holding One Shadow Image
In some particular situations, participants need to recover different secrets both within a group (i.e., intragroup) and between two groups (i.e., intergroup). However, most of the existing multilevel secret sharing (MLSS) and multigroup secret sharing (...
- research-articleJanuary 2020
On the Value of Order Number and Power in Secret Image Sharing
Shadow images generated from Shamir’s polynomial-based secret image sharing (SSIS) may leak the original secret image information, which causes a significant risk. The occurrence of this risk is closely related to the basis of secret image sharing, Shamir’...
- articleDecember 2011
Empirical models for estimating daily maximum, minimum and mean air temperatures with MODIS land surface temperatures
International Journal of Remote Sensing (IJRS), Volume 32, Issue 24Pages 9415–9440https://doi.org/10.1080/01431161.2011.560622Daily air temperature is a measurement that is required by many biogeochemical models. This study compared daily maximum Tmax, minimum Tmin and mean Tmean air temperature observations collected at 678 standard meteorological stations of China in 2003 ...