Results 101 to 110 of about 63,410 (288)

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

Privacy and Nomadic Computing: A Public-Key Cryptosystem Based on Passwords

open access: yes, 2012
5 pages - ISSN 2105-0422The use of public-key cryptography is complicated in a nomadic computing era. Private keys are typically huge numbers that are impossible to memorize or even to write down and have to be stored electronically.
Prost, Frederic, Terras, Lydie
core   +2 more sources

Climate‐Smart Dairy Practices: The Role of Practice Clusters in Enhancing the Performance of Dairy Farms in Kenya

open access: yesAgribusiness, EarlyView.
ABSTRACT Climate variability is affecting the productivity, profitability, and resilience of smallholder dairy producers in developing countries. The adoption of climate‐smart (CS) dairy practices has been promoted to mitigate these negative effects. However, while interest in dairy CS practices is growing, empirical evidence on their adoption patterns
Mercy Mburu   +4 more
wiley   +1 more source

The Power of Unity: Collective Action and Smallholder Agricultural Performance in West Africa

open access: yesAgribusiness, EarlyView.
ABSTRACT We analyze the impact of collective action through farmer‐based organizations (FBOs) on smallholders' farm performance and income inequality in Ghana, Benin, The Gambia, and Mali. We find that FBO membership increases cereal yield in Ghana and The Gambia, legume yield in Mali, ruminant numbers in Benin and The Gambia, and total farm income in ...
Emmanuel Donkor   +3 more
wiley   +1 more source

Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns

open access: yesNanophotonics
The significance of a cryptograph method lies in its ability to provide high fidelity, high security, and large capacity. The emergence of metasurface-empowered cryptography offers a promising alternative due to its unparalleled wavefront modulation ...
Gu Zhen   +9 more
doaj   +1 more source

Laparoscopic Colorectal Surgery in the Era of Robotics: Evolution, Eclipse, or Equilibrium?

open access: yesAnnals of Gastroenterological Surgery, EarlyView.
ABSTRACT Minimally invasive colorectal surgery has undergone a remarkable transformation over the past three decades. Laparoscopy, once viewed with skepticism, is now firmly established as a standard approach, supported by robust randomized trials demonstrating oncologic safety and improved recovery compared to open surgery.
Amanjeet Singh   +3 more
wiley   +1 more source

Implementation of Italian industry 4.0 quantum testbed in Turin

open access: yesIET Quantum Communication
The security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics.
Nicola Corrias   +17 more
doaj   +1 more source

Internet of Things‐Based Framework Application at a University Campus Scale: Linking Smart Monitoring Systems and Stormwater Management

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study presents an Internet of Things‐based stormwater monitoring framework piloted at the University of Maryland campus to support Municipal Separate Stormwater Sewer System compliance and adaptive planning. Developed with key campus stakeholders, the framework integrates real‐time sensor deployment, data‐informed insights on runoff and water ...
Qianyao Si   +16 more
wiley   +1 more source

Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi   +4 more
doaj   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy