Results 41 to 50 of about 2,144,321 (256)

Insights into molecular cluster materials with adamantane‐like core structures by considering dimer interactions

open access: yesJournal of Computational Chemistry, Volume 44, Issue 7, Page 843-856, March 15, 2023., 2023
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan   +7 more
wiley   +1 more source

Efficient space‐time adaptivity for parabolic evolution equations using wavelets in time and finite elements in space

open access: yesNumerical Linear Algebra with Applications, Volume 30, Issue 1, January 2023., 2023
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley   +1 more source

Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells

open access: yesProgress in Photovoltaics: Research and Applications, EarlyView., 2023
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel   +11 more
wiley   +1 more source

The most efficient indifferentiable hashing to elliptic curves of j-invariant 1728

open access: yesJournal of Mathematical Cryptology, 2022
This article makes an important contribution to solving the long-standing problem of whether all elliptic curves can be equipped with a hash function (indifferentiable from a random oracle) whose running time amounts to one exponentiation in the basic ...
Koshelev Dmitrii
doaj   +1 more source

Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack

open access: yesApplied Sciences, 2019
The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending. Adversaries controlling more than half of the total hashing power of a network can perform this attack.
Sarwar Sayeed, Hector Marco-Gisbert
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Fast and Powerful Hashing using Tabulation [PDF]

open access: yes, 2016
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical.
Thorup, Mikkel
core   +3 more sources

Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation

open access: yesJournal of Medical Internet Research, 2020
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj   +1 more source

The Stability and the Security of the Tangle [PDF]

open access: yes, 2019
In this paper we study the stability and the security of the distributed data structure at the base of the IOTA protocol, called the Tangle. The contribution of this paper is twofold.
Bramas, Quentin
core   +2 more sources

T‐depth reduction method for efficient SHA‐256 quantum circuit construction

open access: yesIET Information Security, Volume 17, Issue 1, Page 46-65, January 2023., 2023
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy