Results 61 to 70 of about 3,565 (253)
The authors complement bovine pan‐SV with massive novel structural variations (SVs) identified through long‐read sequencing of 83 globally distributed cattle breeds. Repetitive sequence‐mediated SVs (rep‐SV) exhibit distinct dynamic patterns throughout cattle sub‐speciation and/or domestication processes, including uneven distribution between chr‐X and
Zhifan Guo +16 more
wiley +1 more source
Changes in Alcohol Retail Laws and Foot Traffic at Liquor Stores
ABSTRACT We study how expanding alcohol availability at grocery and convenience stores affects consumer traffic in liquor stores by leveraging recent changes in state‐level alcohol distribution laws in a difference‐in‐difference quasi‐experimental design.
Nathan Palardy +3 more
wiley +1 more source
Feasibility of Quantum Key Distribution Between Supersonic Aircraft
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security.
Solomon Raphael McKiernan +1 more
doaj +1 more source
Assessing Photovoltaic Recycling Capacities and Policy Gaps in the European Union
This study maps photovoltaic recycling capacity in the EU and key global regions, highlighting gaps between growing waste volumes and available infrastructure. It combines survey insights and policy analysis to identify recycling bottlenecks and offers recommendations to boost circularity in the solar sector.
Nieves Espinosa +3 more
wiley +1 more source
Abstract The Russian invasion of Ukraine in February 2022 had profound consequences for the global economy. As both countries are major commodity exporters, the food value chain was also affected. This study investigates the impact of the invasion on stock prices, profitability and sentiments of agribusinesses along the food supply chain by using an ...
Julia Höhler +2 more
wiley +1 more source
Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network
In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol introduces challenge–response–pair mechanisms enabling the generation, distribution, and verification of ...
Mahafujul Alam +2 more
openaire +2 more sources
Abstract This study explores the rent price ratio in agricultural land markets, crucial for evaluating market efficiency, policy needs, and farmer decision‐making. Traditionally, the analyses faced challenges due to the absence of concurrent sale and rent data for the same land, potentially leading to biased results.
Marius Michels +4 more
wiley +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Information and data protection within a RDBMS
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc).
Y. Khmelevsky
doaj +1 more source
Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley +1 more source

