Results 91 to 100 of about 243,777 (279)
Assessing the feasibility of quantum learning algorithms for noisy linear problems
Quantum algorithms for solving noisy linear problems are reexamined, under the same assumptions taken from the existing literature. The findings of this work include on the one hand extended applicability of the quantum Fourier transform to the ring ...
Minkyu Kim, Panjin Kim
doaj +1 more source
This study presents an infrared monitoring approach for direct laser interference patterning (DLIP) combined with a convolutional neural network (CNN). Thermal emission data captured during structuring are used to predict surface topography parameters.
Lukas Olawsky +5 more
wiley +1 more source
Dynamic Group Key Exchange Protocol With Lattice Trapdoor and Re-Encryption Mechanisms
Post-quantum group key exchange protocols have become an increasingly critical area of research due to the potential threat quantum computers pose to classical cryptographic schemes. Traditional group key exchange protocols, often based on Diffie-Hellman
Narn-Yih Lee, Yuan-Ting Tsai
doaj +1 more source
Ring artifacts correction in compressed sensing tomographic reconstruction
We present a novel approach to handle ring artifacts correction in compressed sensing tomographic reconstruction. The correction is part of the reconstruction process, which differs from classical sinogram pre-processing and image post-processing ...
Mirone, Alessandro, Paleo, Pierre
core +3 more sources
Additive Gaussian Process Regression for Predictive Design of High‐Performance, Printable Silicones
A chemistry‐aware design framework for tuning printable polydimethylsiloxane (PDMS) for vat photopolymerization (VPP) is developed using additive Gaussian process (GP) modeling. Polymer network mechanics informs variable groupings, feasible formulation constraints, and interaction variables.
Roxana Carbonell +3 more
wiley +1 more source
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as ...
Robert E. Campbell Sr.
doaj +1 more source
Why Catastrophic Organizational Failures Happen [PDF]
Excerpt from the introduction: The purpose of this chapter is to examine the major streams of research about catastrophic failures, describing what we have learned about why these failures occur as well as how they can be prevented. The chapter begins
Roberto, Michael A.
core +1 more source
Homomorphic encryption based on the Ring Learning with Errors (RLWE) problem
Verilerin mahremiyetini sağlamak için kullanılan şifreleme teknikleri, teknolojideki gelişmelere uygun olarak değişmekte ve ihtiyaçlara göre şekillenmektedir. Günümüzde şifrelenerek depolanması gereken verilerin miktarının artması, verilerin hem güvenliğini ve hem de verimli bir şekilde kullanılabilirliğini sağlayan şifreleme tekniklerine ihtiyaç ...
openaire +2 more sources
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
We extend a commitment scheme based on the learning with errors over rings $$\mathsf{RLWE}$$ problem, and present efficient companion zero-knowledge proofs of knowledge. Our scheme maps elements from the ring or equivalently, n elements from $$\mathbb F_q$$ to a small constant number of ring elements.
Fabrice Benhamouda +3 more
openaire +2 more sources
Additive manufacturing provides precise control over the placement of continuous fibres within polymer matrices, enabling customised mechanical performance in composite components. This article explores processing strategies, mechanical testing, and modelling approaches for additive manufactured continuous fibre‐reinforced composites.
Cherian Thomas, Amir Hosein Sakhaei
wiley +1 more source

