Results 31 to 40 of about 4,621,200 (286)
Performance Analysis of a Coal-Fired External Combustion Compressed Air Energy Storage System
Compressed air energy storage (CAES) is one of the large-scale energy storage technologies utilized to provide effective power peak load shaving. In this paper, a coal-fired external combustion CAES, which only uses coal as fuel, is proposed.
Wenyi Liu +5 more
doaj +1 more source
Long-distance quantum key distribution using concatenated entanglement swapping with practical resources [PDF]
We present our approach for sharing photons and assessing resultant four-photon visibility between two distant parties using concatenated entanglement swapping. In addition we determine the corresponding key generation rate and the quantum bit-error rate.
Khalique, Aeysha, Sanders, Barry C.
core +2 more sources
Codes for Key Generation in Quantum Cryptography
As an alternative to the usual key generation by two-way communication in schemes for quantum cryptography, we consider codes for key generation by one-way communication.
BERTHOLD-GEORG ENGLERT +6 more
core +2 more sources
HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks [PDF]
Wireless Sensor Networks (WSN) consist of small sensor nodes which operate until their energy reserve is depleted. These nodes are generally deployed to the environments where network lifespan is much longer than the lifetime of a node.
Levi, Albert +2 more
core +2 more sources
Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation
Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and ...
Meng Wang +5 more
doaj +1 more source
Next Generation Organizations: 9 Key Traits [PDF]
Outlines a vision for impact-driven, business savvy, culturally competent organizations wired for policy advocacy that value continuous learning, shared leadership, ambiguous work-life boundaries, constituents as thought partners, and boards as value ...
core
Secret Key Generation from Correlated Sources and Secure Link
In this paper, we study the problem of secret key generation from both correlated sources and a secure channel. We obtain the optimal secret key rate in this problem and show that the optimal scheme is to conduct secret key generation and key ...
Cao, Daming, Kang, Wei
core +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
Low Input Ripple High Step-Up Extendable Hybrid DC-DC Converter
The widely utilization of renewable energy with low output voltage makes the high voltage ratio boosting converter more popular. This article introduces a non-isolated low input ripple high step-up extendable hybrid DC-DC converter.
Guoqing Lin, Zhou Zhang
doaj +1 more source
Secret key generation from Gaussian sources using lattice hashing
We propose a simple yet complete lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves strong secret key rates up to 1/2 nat from the optimal in the case of "degraded" source ...
Bloch, Matthieu R. +2 more
core +2 more sources

