Results 21 to 30 of about 7,526,383 (337)

Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect

open access: yesEntropy, 2021
We perform security analysis of a passive continuous-variable quantum key distribution (CV-QKD) protocol by considering the finite-size effect. In the passive CV-QKD scheme, Alice utilizes thermal sources to passively make preparation of quantum state ...
Shengjie Xu   +5 more
doaj   +1 more source

An Intelligent Solution for Automatic Garment Measurement Using Image Recognition Technologies

open access: yesApplied Sciences, 2022
Global digitization trends and the application of high technology in the garment market are still too slow to integrate, despite the increasing demand for automated solutions. The main challenge is related to the extraction of garment information-general
Agne Paulauskaite-Taraseviciene   +5 more
doaj   +1 more source

Finite-size effects for anisotropic bootstrap percolation: logarithmic corrections [PDF]

open access: yes, 2007
In this note we analyze an anisotropic, two-dimensional bootstrap percolation model introduced by Gravner and Griffeath. We present upper and lower bounds on the finite-size effects.
A. Holroyd   +28 more
core   +4 more sources

Size discrepancies in molars and first key to optimal occlusion [PDF]

open access: yesEuropean Journal of Dentistry, 2017
ABSTRACT Objective: The aim of this research project was to determine whether the sizes of the first molars allow clinicians to achieve the first goal of an ideal clinical outcome. Material and Methods: Seventy-eight sets of dental casts that have been presented to the American Board of Orthodontics were evaluated.
Sam H Lee   +2 more
openaire   +2 more sources

Some security bounds for the key sizes of DGHV scheme [PDF]

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2014
The correctness in decrypting a ciphertext after some operations in the DGVH scheme depends heavily on the dimension of the secret key. In this paper we compute two bounds on the size of the secret key for the DGHV scheme to decrypt correctly a ciphertext after a fixed number of additions and a fixed number of multiplication.
F. Marinelli   +3 more
openaire   +3 more sources

Live and Let Die: On the Management of Creativity

open access: yesTechnology Innovation Management Review, 2019
Literature has pointed to the importance of feedback on creative ideas in innovation management processes. However, little is known about the practices that constitute the feedback process and their effect on employees’ future willingness to ...
Michael Hartmann   +2 more
doaj   +1 more source

Key point detection method for fish size measurement based on deep learning

open access: yesIET Image Processing, 2023
Accurate fish size measurement in breeding areas is crucial for the fishing industry. Unlike acoustic methods with high equipment cost and low measurement accuracy, current image‐based methods offer a promising alternative.
Yaozhen Yu, Hao Zhang, Fei Yuan
doaj   +1 more source

Universality in snowflake aggregation [PDF]

open access: yes, 2003
Aggregation of ice crystals is a key process governing precipitation. Individual ice crystals exhibit considerable diversity of shape, and a wide range of physical processes could influence their aggregation; despite this we show that a simple computer ...
C. D. Westbrook   +6 more
core   +2 more sources

Don't break a leg: Running birds from quail to ostrich prioritise leg safety and economy in uneven terrain [PDF]

open access: yes, 2014
Cursorial ground birds are paragons of bipedal running that span a 500-fold mass range from quail to ostrich. Here we investigate the task-level control priorities of cursorial birds by analysing how they negotiate single-step obstacles that create a ...
Alexander   +87 more
core   +6 more sources

Practical issues of twin-field quantum key distribution

open access: yesNew Journal of Physics, 2019
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications.
Feng-Yu Lu   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy