Results 91 to 100 of about 929,226 (361)

Mechanochemical Synthesis and Characterization of Nanostructured ErB4 and NdB4 Rare‐Earth Tetraborides

open access: yesAdvanced Engineering Materials, Volume 27, Issue 6, March 2025.
ErB4 and NdB4 nanostructured powders are produced by mechanochemical synthesis. 5 h mechanical alloying and 4 M HCl acid leaching are used in the production. ErB4 and NdB4 powders exhibit maximum magnetization of 0.4726 emu g−1 accompanied with an antiferromagnetic‐to‐paramagnetic phase transition at about TN = 18 K and 0.132 emu g−1 with a maximum at ...
Burçak Boztemur   +5 more
wiley   +1 more source

Quantum Key Distribution with Blind Polarization Bases [PDF]

open access: yes, 2005
We propose a new quantum key distribution scheme that uses the blind polarization basis. In our scheme the sender and the receiver share key information by exchanging qubits with arbitrary polarization angles without basis reconciliation.
Kim, Chil-Min   +3 more
core   +1 more source

Static and Dynamic Behavior of Novel Y‐Shaped Sandwich Beams Subjected to Compressive Loadings: Integration of Supervised Learning and Experimentation

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi   +4 more
wiley   +1 more source

DECOY STATE QUANTUM KEY DISTRIBUTION

open access: yesInternational Islamic University Malaysia Engineering Journal, 2010
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to ...
Sellami Ali
doaj   +1 more source

Satellite-based measurement-device-independent quantum key distribution

open access: yesNew Journal of Physics, 2020
A satellite-based measurement-device-independent quantum key distribution model is proposed and its performance is analyzed through numerical simulations.
Wentao Liang, Rongzhen Jiao
doaj   +1 more source

Finite key effects in satellite quantum key distribution

open access: yesnpj Quantum Information, 2022
Global quantum communications will enable long-distance secure data transfer, networked distributed quantum information processing, and other entanglement-enabled technologies.
Jasminder S. Sidhu   +4 more
doaj   +1 more source

Applying Gaussian quantum discord to quantum key distribution

open access: yes, 2014
In this paper, we theoretically prove that the Gaussian quantum discord state of optical field can be used to complete continuous variable (CV) quantum key distribution (QKD). The calculation shows that secret key can be distilled with a Gaussian quantum
Su, Xiaolong
core   +1 more source

Towards Communication-Efficient Quantum Oblivious Key Distribution [PDF]

open access: yes, 2012
Oblivious Transfer, a fundamental problem in the field of secure multi-party computation is defined as follows: A database DB of N bits held by Bob is queried by a user Alice who is interested in the bit DB_b in such a way that (1) Alice learns DB_b and ...
C. Crépeau   +8 more
core   +2 more sources

Consolidate Overview of Ribonucleic Acid Molecular Dynamics: From Molecular Movements to Material Innovations

open access: yesAdvanced Engineering Materials, EarlyView.
Molecular dynamics simulations are advancing the study of ribonucleic acid (RNA) and RNA‐conjugated molecules. These developments include improvements in force fields, long‐timescale dynamics, and coarse‐grained models, addressing limitations and refining methods.
Kanchan Yadav, Iksoo Jang, Jong Bum Lee
wiley   +1 more source

Device-independent quantum key distribution with asymmetric CHSH inequalities

open access: yesQuantum, 2021
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
E. Woodhead, A. Acín, Stefano Pironio
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy