112 resultados para Bicycle Share Scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this journal article, we take multiple secrets into consideration and generate a key share for all the secrets; correspondingly, we share each secret using this key share. The secrets are recovered when the key is superimposed on the combined share in different locations using the proposed scheme. Also discussed and illustrated within this paper is how to embed a share of visual cryptography into halftone and colour images. The remaining share is used as a key share in order to perform the decryption. It is also worth noting that no information regarding the secrets is leaked in any of our proposed schemes. We provide the corresponding results in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel scheme for enhancing electron localization in intense-field dissociation is outlined. Through manipulation of a bound vibrational wavepacket in the exemplar deuterium molecular ion, simulations demonstrate that the application of multiple phase-locked, few-cycle IR pulses can provide a powerful scheme for directing the molecular dissociation pathway. By tuning the time delay and carrier–envelope–phase for a sequence of pulse interactions, the probability of the electron being localized to a chosen nucleus can be enhanced to above 80%.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Newton–Raphson solution scheme with a stress point algorithm is presented for the implementation of an elastic–viscoplastic soilmodel in a finite element program. Viscoplastic strain rates are calculated using the stress and volumetric states of the soil. Sub-incrementsof time are defined for each iterative calculation of elastic–viscoplastic stress changes so that their sum adds up to the time incrementfor the load step. This carefully defined ‘iterative time’ ensures that the correct amount of viscoplastic straining is accumulated overthe applied load step. The algorithms and assumptions required to implement the solution scheme are provided. Verification of the solutionscheme is achieved by using it to analyze typical boundary value problems.