Results 1 to 10 of about 309,416 (282)

In Vivo Bone Progression in and around Lattice Implants Additively Manufactured with a New Titanium Alloy

open access: yesApplied Sciences, 2023
The osseointegration in/around additively manufactured (AM) lattice structures of a new titanium alloy, Ti–19Nb–14Zr, was evaluated. Different lattices with increasingly high sidewalls gradually closing them were manufactured and implanted in sheep ...
Anne-Françoise Obaton   +6 more
doaj   +1 more source

Biomolecule-Based Optical Metamaterials: Design and Applications

open access: yesBiosensors, 2022
Metamaterials are broadly defined as artificial, electromagnetically homogeneous structures that exhibit unusual physical properties that are not present in nature. They possess extraordinary capabilities to bend electromagnetic waves.
Ana Laura Torres-Huerta   +4 more
doaj   +1 more source

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

Towards Ordinal Data Science [PDF]

open access: yesTransactions on Graph Data and Knowledge, 2023
Order is one of the main instruments to measure the relationship between objects in (empirical) data. However, compared to methods that use numerical properties of objects, the amount of ordinal methods developed is rather small.
Stumme, Gerd   +2 more
doaj   +1 more source

Partial categorification of Hopf algebras and representation theory of towers of \mathcalJ-trivial monoids [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2014
This paper considers the representation theory of towers of algebras of $\mathcal{J} -trivial$ monoids. Using a very general lemma on induction, we derive a combinatorial description of the algebra and coalgebra structure on the Grothendieck rings $G_0 ...
Aladin Virmaux
doaj   +1 more source

Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

open access: yesIEEE Access, 2021
An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things (NB-IoT) technology, which is a 3GPP standards compliant connectivity solution.
Ohood Saud Althobaiti, Mischa Dohler
doaj   +1 more source

Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes

open access: yesIEEE Access, 2023
One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system.
Alla Levina   +2 more
doaj   +1 more source

Generating all finite modular lattices of a given size [PDF]

open access: yes, 2014
Modular lattices, introduced by R. Dedekind, are an important subvariety of lattices that includes all distributive lattices. Heitzig and Reinhold developed an algorithm to enumerate, up to isomorphism, all finite lattices up to size 18.
Jipsen, Peter, Lawless, Nathan
core   +3 more sources

Edge Waves and Localization in Lattices Containing Tilted Resonators

open access: yesFrontiers in Materials, 2017
The paper presents the study of waves in a structured geometrically chiral solid. A special attention is given to the analysis of the Bloch-Floquet waves in a doubly periodic high-contrast lattice containing tilted resonators.
Domenico Tallarico   +4 more
doaj   +1 more source

The polynomial learning with errors problem and the smearing condition

open access: yesJournal of Mathematical Cryptology, 2022
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy