Results 71 to 80 of about 11,395 (193)

Transmon Qubit Designs Toward Giga‐Scale Integration

open access: yes
SmartSys, Volume 2, Issue 1, March 2026.
Shi‐Li Zhang   +3 more
wiley   +1 more source

Spatial distribution and drivers of aboveground forest biomass in Mexico using GEDI and national forest inventory data

open access: yesRemote Sensing in Ecology and Conservation, Volume 11, Issue 6, Page 755-772, December 2025.
GEDI LiDAR‐derived biomass models were calibrated using local field data across various forest types in Mexico, resulting in a significant improvement in AGBD estimation accuracy compared to the standard GEDI products. The models reduced biomass estimation errors by over 30% and showed the highest accuracy in areas with moderate slopes and low forest ...
José Luis Hernández‐Stefanoni   +8 more
wiley   +1 more source

A Survey of Post-Quantum Cryptography Migration in Vehicles

open access: yesIEEE Access
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography ...
Nils Lohmiller   +3 more
doaj   +1 more source

Recent Progress in Strategies to Enhance the Spin‐Orbit Coupling of Multiresonance Thermally Activated Delayed Fluorescent Materials for Narrowband Organic Light‐Emitting Diodes

open access: yesAdvanced Photonics Research, Volume 6, Issue 11, November 2025.
For multiresonance thermally activated delayed fluorescent emitters, the reverse intersystem crossing (RISC) process is of paramount importance. This review summarizes two approaches to enhance the RISC rate by improving spin‐orbit coupling: the heavy atom strategy and the long‐range charge‐transfer/short‐range charge‐transfer strategy.
Hanrui Su   +3 more
wiley   +1 more source

Secure and Scalable File Encryption for Cloud Systems via Distributed Integration of Quantum and Classical Cryptography

open access: yesApplied Sciences
We propose a secure and scalable file-encryption scheme for cloud systems by integrating Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Advanced Encryption Standard (AES) within a distributed architecture.
Changjong Kim   +5 more
doaj   +1 more source

The Morality of Price/Quality and Ethical Consumerism [PDF]

open access: yes, 2019
Hussain claims that ethical consumers are subject to democratic requirements of morality, whereas ordinary price/quality consumers are exempt from these requirements.
Fink, Julian, Schubert, Daniel
core  

Blood‐based Alzheimer's disease biomarkers in a behavioral neurology clinic: Real‐world implementation, clinical utility, and diagnostic performance

open access: yesAlzheimer's &Dementia, Volume 21, Issue 11, November 2025.
Abstract INTRODUCTION Blood‐based biomarkers (BBMs) for Alzheimer's disease (AD), including plasma phosphorylated tau (p‐tau), are increasingly used in clinical practice, but “real‐world” implementation patterns, context‐of‐use (COU), clinical utility, and diagnostic performance are incompletely understood. METHODS A retrospective analysis of the first
Igor Prufer Q C Araujo   +24 more
wiley   +1 more source

Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation

open access: yesIEEE Access
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile   +6 more
doaj   +1 more source

Temperature‐Inert Terbium Cluster Scintillator

open access: yesAggregate, Volume 6, Issue 10, October 2025.
A terbium cluster scintillator with temperature‐inert and excellent X‐ray excited luminescence property was constructed, which was successfully used in temperature‐independent high‐resolution X‐ray imaging with an ultrahigh spatial resolution of 23.3 LP/mm.
You‐Song Hu   +11 more
wiley   +1 more source

Challenges and opportunities on the horizon of post-quantum cryptography

open access: yesAPL Quantum
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj   +1 more source

Home - About - Disclaimer - Privacy