نتایج جستجو برای: keywords risk sharing
تعداد نتایج: 2889943 فیلتر نتایج به سال:
Visual cryptography is a secret sharing technique mainly used for image sharing. In the case of extended visual cryptography we use meaningful shares to hide image. Contrast loss in decrypted image is a major problem. Here we use Additional basis matrix and perfect white pixel reconstruction to improve the contrast in color extended visual cryptography. Keywords— Visual Cryptography (VC), Halft...
Fueled by the widespread deployment of information communication technologies, the notion of collaborative consumption has become popular in recent years. Traditionally, individuals have viewed ownership as the most desirable way to access products. In recent years, individuals have shown a robust appetite for collaborative consumption. While the prevalence of collaborative consumption activiti...
[Abstract] This paper introduces the Hubei science and technology document sharing platform from the aspect of technology, mainly including the requirement analysis, technical solution, services and some innovation. The future development of such platforms is also briefly analyzed. It could give the reference for the construction of similar platform. [Keywords] Science and technology document,r...
As an integrated part of a supply contract, trade credit has intrinsic connections with supply chain contracting and inventory management. Using a stylized model that explicitly captures the interaction of firms’ operations decisions and financial risks, this paper attempts to develop a deeper understanding of trade credit from an operational perspective. Revolving around the question of what r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید