ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Technology
Mathematics
Agronomy and forestry
Economy
Computing
Biology
Pure sciences
Law
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Germany
Ukraine
Australia
Brazil
Romania
South Africa
Turkey, Turkish Republic
Russia
all records (72)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
79.912  Articles
1 of 7.992 pages  |  10  records  |  more records»
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show p... see more

Among the varius coloring of graphs, the concept of equitable total coloring of graph G is the coloring of all its vertices and edges in which the number of elements in any two color classes differ by atmost one. The minimum number of colors required is c... see more

Photon interaction effective atomic number (Zeff) for partial as well as total photon interaction processes has been computed using logarithmic interpolation method for seven different concretes viz. (i) Ordinary, (ii) Hematite - Serpentine, (iii) Ilmenit... see more

The reverse Zeno effect whereby an unstable quantum state associated with radiative decay is accelerated by frequent measurements was demonstrated experimentally for numbers of spontaneous photons in a 3 m3 hyperdark chamber during the 60 s following a bu... see more

In flapping underwater vehicles the propulsive performance of harmonically sinusoidal heaving and pitching foil will be degraded by some awkward changes in effective angle of attack profile, as the Strouhal number increases. This paper surveys different a... see more

A DDoS attacker attempts to disrupt a target, by flooding it with illegitimate packets which are generated from a large number of zombies, usurping its bandwidth and overtaxing it to prevent legitimate inquiries from getting through. This paper reports th... see more

Context. We consider security properties of decentralized blockchain-based consensus protocols. The object of research is blockconfirmation time for users to get assurance that their transaction will not be reverted.Objective. The goal of the paper is to ... see more

Face anti-spoof systems are needed in facial recognition systems to ward off attacks that present fake faces in front of the camera or image capture sensor (presentation attack). To build the system, a data set is needed to build a classification model th... see more

Cognitive Radio Networks (CRNs) have been conceived to improve the efficiency of accessing the spectrum. However, these networks are prone to various kinds of attacks and failures that can compromise the security and performance of their users. One of the... see more

1 of 7.992 pages  |  10  records  |  more records»