نتایج جستجو برای: shares
تعداد نتایج: 20417 فیلتر نتایج به سال:
abstract present study used translog cost function for determining break point of paddy farms. requested data set include inputs’ prices and quantities, and production amounts had been acquired from 500 rice farmers of guilan province at 2009. model used in this study is seemingly unrelated regressions (sur). the results showed that labor and pesticides had the highest and lowest share of produ...
Visual Cryptography facilitates hiding a secret image into n number of shares distributed to n number of participants. This kind of scheme is very useful as the participants in such security systems need not know the cryptographic knowledge in order to recover the secret image from the shares. This phenomenon is known as VCS (Visual Cryptography Scheme). An extended VCS is the one which is capa...
This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noiselike meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers’ attention. Previous works in the field focus on either increasing number of secrets or creating meaningful ...
We study a known negative signal, the sale of insider shares in an IPO and find that insiders adopt two concealment strategies consistent with wealth-maximizing behavior. First, insiders underreport the number of personally owned shares in the prominent original prospectus and use an obscure amendment to communicate the true higher level of shares to be offered. Second, when insiders increase s...
The application of utility theory to insurance is incomplete without the inclusion of the structure of risk sharing; to limit the use of utility to accept or reject decisions misses its power to explain the real world of excess insurance and reinsurance. The fine subdivision of risk which is routinely achieved bv insurance institutions can be explained on this basis. Practica1 methods of evalua...
A unique database was created that describes the methods used to allocate shares in nearly every major catch share fishery in the world. Approximately 54% of the major catch share fisheries in the world allocated the Total Allowable Catch (TAC) solely on the basis of historical catch records, 3% used auctions, and 6% used equal sharing rules. The remaining 37% used a combination of methods, inc...
We describe a new technique for improving the efficiency of the masking countermeasure against side-channel attacks. Our technique is based on using common shares between secret variables, in order to reduce the number of finite field multiplications. Our algorithms are proven secure in the ISW probing model with n > t + 1 shares against t probes. For AES, we get an equivalent of 2.8 nonlinear ...
Visual Cryptography (VC) is a special type of encryption technique where an image or document is encrypted by breaking it down into shares. These shares are then printed on transparencies. Decryption is done by superimposing the shares. Thus one can visually decode the secret image without computation. However, this property makes VC insecure as a third party can easily retrieve the secret info...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید