Results 41 to 50 of about 13,481,561 (335)
Political-military alliances in shaping the security of Poland in 1918-1939 [PDF]
Poland was forming allied relations in the twenties and thirties of the twentieth century due to the state’s weakness, mainly in military and economic terms. The Polish state’s situation regarding political and military security guarantees on the part of
Zdzisław Cutter
doaj +1 more source
Military and Technical Cooperation of Russia in System of National Security of the Country
In the article, the role of the military and technical cooperation (MTC) of Russia with the foreign states in ensuring national security of the country is considered.
Igor Mikhailovich Levkin +1 more
doaj +1 more source
Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan +10 more
doaj +1 more source
Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review
With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains.
A. Khan +4 more
semanticscholar +1 more source
A Hybrid Analysis for Security Protocols with State [PDF]
Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session.
Dougherty, Daniel J. +3 more
core +3 more sources
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources
The State of Food Security and Nutrition in the World 2020
Five years into the 2030 Agenda, it is time to assess progress and to question whether continuing efforts implemented thus far will allow countries to reach SDG 2 targets.
D. Missing
semanticscholar +1 more source
Measuring Entangled Qutrits and Their Use for Quantum Bit Commitment [PDF]
We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete ...
Bartlett, Stephen D. +7 more
core +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
Decoy State Quantum Key Distribution With Modified Coherent State
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett +6 more
core +1 more source

