Results 1 to 10 of about 202,675 (264)

QUANTUM COMPUTATION WITH BALLISTIC ELECTRONS [PDF]

open access: yesInternational Journal of Modern Physics B, 2001
We describe a solid state implementation of a quantum computer using ballistic single electrons as flying qubits in 1D nanowires. We show how to implement all the steps required for universal quantum computation: preparation of the initial state, measurement of the final state and a universal set of quantum gates.
Ionicioiu, Radu   +2 more
openaire   +2 more sources

Information Security Study for Information Hiding in Electronic Computers

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2005
Cryptographic technologies are nowadays widely recognized asthe essential tool for  security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj   +1 more source

Portable Instrument for Monitoring Environmental Toxins Using Immobilized Quantum Dots as the Sensing Material

open access: yesApplied Sciences, 2020
A portable instrumental system was designed for the routine environmental monitoring of toxic volatile organic compounds (VOCs) in atmospheric conditions based on changes in the photoluminescence emission of semiconductor nanoparticles (quantum dots ...
Francisco J. Ferrero   +7 more
doaj   +1 more source

Design and Characterization of a Wearable Inertial Measurement Unit

open access: yesSensors
The utilization of inertial measurement units as wearable sensors is proliferating across various domains, such as health care, sports, and rehabilitation.
Diego Valdés Tirado   +4 more
doaj   +1 more source

A hybrid modified step Whale Optimization Algorithm with Tabu Search for data clustering

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Clustering is a popular data analysis tool that groups similar data objects into disjoint clusters. Clustering algorithms have major drawbacks, such as: sensitivity to initialization and getting trapped in local optima.
Kareem Kamal A. Ghany   +3 more
doaj   +1 more source

SYSTEM DYNAMICS MODEL FOR EVALUATION OF REUSE OF ELECTRONIC WASTE ORIGINATED FROM PERSONAL COMPUTERS [PDF]

open access: yesSerbian Journal of Management, 2016
Information and Communication Technologies (ICT) are part of the day to day activities of a large part of world population, however its use involves a growing generation of electronic waste (ewaste).
Eugênio Simonetto   +5 more
doaj   +1 more source

From Things to Services: A Social IoT Approach for Tourist Service Management

open access: yesIEEE Access, 2020
In the context of Internet of Things (IoT), the cooperation and synergy between varied and disparate communicating objects is strained by trustworthiness, confidentiality and interoperability concerns.
George Alex Stelea   +5 more
doaj   +1 more source

Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis

open access: yesIEEE Access, 2023
Despite a body of research revolving around online abusive language, aiming at different objectives such as detection, diffusion prediction, and mitigation, existing research has seldom looked at factors motivating this behaviour.
Raneem Alharthi   +3 more
doaj   +1 more source

Implementation of an environmental management system in a company for computers and electronic devices repairing [PDF]

open access: yesJournal of Research and Innovation for Sustainable Society, 2019
The paper presents the conditions, objectives and stages necessary to implement an ISO 14001Environmental Management System in a company for computers and electronic devices repairing.
I Radulescu1   +2 more
doaj   +1 more source

Computation in electron microscopy [PDF]

open access: yesActa Crystallographica Section A Foundations and Advances, 2016
Some uses of the computer and computation in high-resolution transmission electron microscopy are reviewed. The theory of image calculation using Bloch wave and multislice methods with and without aberration correction is reviewed and some applications are discussed.
openaire   +2 more sources

Home - About - Disclaimer - Privacy