Results 71 to 80 of about 1,750,632 (381)

Evaluating End-User Defensive Approaches Against Phishing Using Education and Simulated Attacks in a Croatian University

open access: yesJournal of Cybersecurity and Privacy
This study investigates the effectiveness of two cybersecurity awareness interventions—phishing simulations and organized online training—in enhancing end-user resilience to phishing attacks in a Croatian university setting.
Zlatan Morić   +3 more
doaj   +1 more source

The Higher Spin Rectangle

open access: yes, 2018
The chiral algebra of the symmetric product orbifold of a single-boson CFT corresponds to a "higher spin square" algebra in the large $N$ limit. In this note, we show that a symmetrized collection of $N$ bosons defines a similar structure that we refer ...
Sharma, Menika
core   +1 more source

Wirelessly Powered Ingestible Capsule for Optical Stimulation of the Gastrointestinal Tract in Rodents

open access: yesAdvanced Materials Technologies, EarlyView.
An ingestible electronic capsule, ICOPS, enables non‐invasive optical gut stimulation in rodents. ICOPS features modular LEDs and optimized power transfer for robust, in vivo functionality. This cleanroom‐free, 3D‐printed platform offers a compact, scalable solution for optogenetically interfacing enteric neural circuits, promising advances in ...
Mohamed Elsherif   +9 more
wiley   +1 more source

Differential Geometry of the q-plane

open access: yes, 2001
Hopf algebra structure on the differential algebra of the extended $q$-plane is defined. An algebra of forms which is obtained from the generators of the extended $q$-plane is introduced and its Hopf algebra structure is given.Comment: 9 ...
Reshetikhin N. Y.   +2 more
core   +1 more source

Experimental Test of the Three‐Setting Clauser–Horne–Shimony–Holt Inequality with Nonmaximally Orbital Angular Momentum Entangled States

open access: yesAdvanced Photonics Research, EarlyView.
Herein, the maximum violation of the three‐setting Clauser–Horne–Shimony–Holt (CHSH) inequality using nonmaximally entangled photons with orbital angular momentum is demonstrated. By mapping the optimization problem to maximizing a triangle's perimeter inscribed in an ellipse, the experiment validates the geometric approach and highlights the ...
Dongkai Zhang   +2 more
wiley   +1 more source

Innovative Air-Preconditioning Method for Accurate Particulate Matter Sensing in Humid Environments

open access: yesSensors
Smart cities rely on a network of sensors to gather real-time data on various environmental factors, including air quality. This paper addresses the challenges of improving the accuracy of low-cost particulate matter sensors (LCPMSs) which can be ...
Zdravko Kunić   +3 more
doaj   +1 more source

Algebras of quotients of path algebras

open access: yesJournal of Algebra, 2008
Leavitt path algebras are shown to be algebras of right quotients of their corresponding path algebras. Using this fact we obtain maximal algebras of right quotients from those (Leavitt) path algebras whose associated graph satisfies that every vertex connects to a line point (equivalently, the Leavitt path algebra has essential socle).
openaire   +3 more sources

Identities on Units of Algebraic Algebras

open access: yesJournal of Algebra, 2002
Let \(f(\zeta_1,\zeta_2,\dots,\zeta_n)\) be a Laurent polynomial over the field \(K\) so that \(f\in K[\zeta_1,\zeta_1^{-1},\dots,\zeta_n,\zeta_n^{-1}]\). If \(A\) is a \(K\)-algebra with group of units \(U(A)\), then it makes sense to consider evaluations of the form \(f(u_1,u_2,\dots,u_n)\) with \(u_1,u_2,\dots,u_n\in U(A)\), and then \(U(A)\) is ...
Michael A. Dokuchaev   +1 more
openaire   +3 more sources

Techniques and Advances in Ultrafast Photography

open access: yesAdvanced Photonics Research, EarlyView.
This review maps the fast‐growing field of ultrafast photography from early mechanical cameras to modern optical‐computational methods. It organizes techniques into four families (multishot passive/active; single‐shot passive/active), explains how they reach trillion‐frame‐per‐second speeds, compares capabilities and tradeoffs, and highlights ...
Chen Huang   +10 more
wiley   +1 more source

Advancing Cybersecurity with Honeypots and Deception Strategies

open access: yesInformatics
Cybersecurity threats are becoming more intricate, requiring preemptive actions to safeguard digital assets. This paper examines the function of honeypots as critical instruments for threat detection, analysis, and mitigation.
Zlatan Morić   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy