Results 171 to 180 of about 268,307 (331)

Generalized triangle group based S-box construction for secure image encryption. [PDF]

open access: yesSci Rep
Abbasi AZ   +5 more
europepmc   +1 more source

Most totally real fields do not have universal forms or the Northcott property. [PDF]

open access: yesProc Natl Acad Sci U S A
Daans N   +4 more
europepmc   +1 more source

Quantum Iterative Methods for Solving Differential Equations with Application to Computational Fluid Dynamics

open access: yesAdvanced Quantum Technologies, EarlyView.
Quantum algorithms for differential equations are developed with applications in computational fluid dynamics. The methods follow an iterative simulation framework, implementing Jacobi and Gauss–Seidel schemes on quantum registers through linear combinations of unitaries.
Chelsea A. Williams   +4 more
wiley   +1 more source

Entanglement Swapping for Partially Entangled Qudits and the Role of Quantum Complementarity

open access: yesAdvanced Quantum Technologies, EarlyView.
The entanglement swapping protocol is extended to partially entangled qudit states and analyzed through complete complementarity relations. Analytical bounds on the average distributed entanglement are established, showing how the initial local predictability and entanglement constrain the operational distribution.
Diego S. Starke   +3 more
wiley   +1 more source

Effectiveness of In‐Person Versus Online Negotiation Teaching for Practitioners

open access: yesNegotiation Journal, EarlyView., 2023
Most negotiation courses have been taught in person. However, online education has become more prevalent over the past decade due to its flexibility, cost and time efficiency, and new digital technologies designed to compensate for the lack of personal contact.
Patricia Oehlschläger, Michael A. Merz
wiley   +1 more source

Home - About - Disclaimer - Privacy