Results 51 to 60 of about 20,376 (274)
Phase Diagrams and Piezoelectric Properties of Wurtzite Al1−x−yScxGdyN Heterostructural Alloys
This study demonstrates ferroelectricity and piezoelectric properties improvement of quaternary wurtzite Al1−x−yScxGdyN${\rm Al}_{1-x-y}{\rm Sc}_x{\rm Gd}_y{\rm N}$ films, guided by density functional theory calculations. Wurtzite Al1−x−yScxGdyN${\rm Al}_{1-x-y}{\rm Sc}_x{\rm Gd}_y{\rm N}$ films have a high optical bandgap, enhanced piezoelectric ...
Julia L. Martin +11 more
wiley +1 more source
Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest.
A. Ambainis +7 more
core +1 more source
Abstract Nucleus outgrower schemes are contractual arrangements where well‐resourced large‐scale farmers (nucleus farmers) are empowered by development support agencies to take charge of smallholder farmers, by providing them with market access and the necessary training on agronomic practices and farm inputs for production.
Dominic Tasila Konja, Awudu Abdulai
wiley +1 more source
Securing Databases from Probabilistic Inference
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement ...
Basin, David +2 more
core +1 more source
The Role of Certifications in Improving Household Food Security Among Peruvian Farmers
ABSTRACT Achieving global food security requires sustainable transformations in agri‐food systems. Voluntary Sustainability Standards (VSS) such as Organic and Fairtrade aim to internalize certain social and environmental costs while promoting more equitable value distribution, improved market access, and sustainable production practices.
Lisa‐Marie Schulte, Awudu Abdulai
wiley +1 more source
Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment
Remote user authentication is a cryptographic mechanism through which a remote server verifies the legitimacy of an authorized user over an insecure communication channel.
Subhas Barman +5 more
doaj +1 more source
Experimental quantum key distribution over highly noisy channels
Error filtration is a method for encoding the quantum state of a single particle into a higher dimensional Hilbert space in such a way that it becomes less sensitive to phase noise.
C. H. Bennett +6 more
core +1 more source
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley +1 more source
Provably Secure Metering Scheme [PDF]
Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients.
Wakaha Ogata, Kaoru Kurosawa
openaire +1 more source
Pancake Lenses through Curved Lamination for Compact Virtual Reality
This article presents an ultrathin VR optical system based on a 1.35 in. microdisplay, leveraging curved lamination technology. Compared to mainstream solutions, the proposed design demonstrates superior compactness (volume compression by 12%) and enhanced optical performance.
Jiaping Sun +5 more
wiley +1 more source

