Results 91 to 100 of about 7,441 (248)
Exploring Imprecise Probabilities in Quantum Algorithms with Possibility Theory
ABSTRACT Quantum computing utilizes the underlying principles of quantum mechanics to perform computations with unmatched performance capabilities. Rather than using classical bits, it operates on qubits, which can exist in superposition and entangled states. This enables the solution of problems that are considered intractable for classical computers.
Jan Schneider +2 more
wiley +1 more source
This work introduces a novel approach for encoding and storing information in the liquid state in microdroplet arrays. These liquid‐in‐liquid prints are generated by a droplet printing system capable of dynamically setting the composition of each droplet pixel.
Maximilian Breitfeld +5 more
wiley +1 more source
Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols [PDF]
Mariana Durcheva, Kiril Danilchenko
openalex +3 more sources
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
SAODV Protocol Based Cryptographic Technique for Automotive Cybersecurity
Angel Ann G Yesudasan, Tressa Michael
openalex +1 more source
The Influence of Big Data‐Driven Educational Technologies on College Teaching Development
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley +1 more source
Quantum computing techniques such as Quantum Annealing and Quadratic Unconstrained Binary Optimization are effectively solving NP‐hard problems in operations management and research, particularly in logistics, manufacturing, and finance. This study maps these applications to present a framework for future adoption across industries. ABSTRACT This study
Daniel Bouzon Nagem Assad +3 more
wiley +1 more source
Exploring Privacy in Location-based Services Using Cryptographic Protocols [PDF]
Roopa Vishwanathan
openalex +1 more source

