Results 1 to 10 of about 309,416 (282)
The osseointegration in/around additively manufactured (AM) lattice structures of a new titanium alloy, Ti–19Nb–14Zr, was evaluated. Different lattices with increasingly high sidewalls gradually closing them were manufactured and implanted in sheep ...
Anne-Françoise Obaton +6 more
doaj +1 more source
Biomolecule-Based Optical Metamaterials: Design and Applications
Metamaterials are broadly defined as artificial, electromagnetically homogeneous structures that exhibit unusual physical properties that are not present in nature. They possess extraordinary capabilities to bend electromagnetic waves.
Ana Laura Torres-Huerta +4 more
doaj +1 more source
Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj +1 more source
Towards Ordinal Data Science [PDF]
Order is one of the main instruments to measure the relationship between objects in (empirical) data. However, compared to methods that use numerical properties of objects, the amount of ordinal methods developed is rather small.
Stumme, Gerd +2 more
doaj +1 more source
Partial categorification of Hopf algebras and representation theory of towers of \mathcalJ-trivial monoids [PDF]
This paper considers the representation theory of towers of algebras of $\mathcal{J} -trivial$ monoids. Using a very general lemma on induction, we derive a combinatorial description of the algebra and coalgebra structure on the Grothendieck rings $G_0 ...
Aladin Virmaux
doaj +1 more source
Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things (NB-IoT) technology, which is a 3GPP standards compliant connectivity solution.
Ohood Saud Althobaiti, Mischa Dohler
doaj +1 more source
Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system.
Alla Levina +2 more
doaj +1 more source
Generating all finite modular lattices of a given size [PDF]
Modular lattices, introduced by R. Dedekind, are an important subvariety of lattices that includes all distributive lattices. Heitzig and Reinhold developed an algorithm to enumerate, up to isomorphism, all finite lattices up to size 18.
Jipsen, Peter, Lawless, Nathan
core +3 more sources
Edge Waves and Localization in Lattices Containing Tilted Resonators
The paper presents the study of waves in a structured geometrically chiral solid. A special attention is given to the analysis of the Bloch-Floquet waves in a doubly periodic high-contrast lattice containing tilted resonators.
Domenico Tallarico +4 more
doaj +1 more source
The polynomial learning with errors problem and the smearing condition
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana +4 more
doaj +1 more source

