-
421
Carbon-Based Materials for Thermoelectrics
Published 2018-01-01“…A wide range of experimental and computational studies on carbon allotropes and composites is covered in this review paper. …”
Get full text
Article -
422
Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel
Published 2025-07-01“…Traditional encryption algorithms, such as AES and RSA, show limitations in the face of modern threats, not least because of their vulnerability to quantum computers. Hybrid solutions are therefore being considered. …”
Get full text
Article -
423
-
424
DFT-analysis of protolytic equivalents of 5-(aryl)-4-(methyl,amino)-1,2,4-triazole-3(2H)-thione
Published 2022-08-01“…The use of modern computer methods in aspects of quantum chemistry and systematic analysis of their results give an idea of the reactivity of organic compounds, as well as to understand the essence of known experimental data, correct predictions, and quantitative estimates. …”
Get full text
Article -
425
Modelling optomechanical responses in optical tweezers beyond paraxial limits
Published 2025-06-01“…Abstract Optically levitated dielectric nanoparticles have become valuable tools for precision sensing and quantum optomechanical experiments. To predict the dynamic properties of a particle trapped in an optical tweezer with high fidelity, a tool is needed to compute the particle’s response to the given optical field accurately. …”
Get full text
Article -
426
Efficient autoencoder pipeline for discovering high entropy alloys with molecular dynamics data
Published 2025-01-01Get full text
Article -
427
Inverse Design of Ultrathin Metamaterial Absorber
Published 2025-07-01“…Comparative analysis against particle swarm optimization further highlights the superior efficiency of the adjoint method, reducing the computational effort by approximately 98%. This inverse design framework thus provides substantial improvements in both the performance and computational cost, offering a promising solution for advanced electromagnetic absorber design.…”
Get full text
Article -
428
Waveflow: Boundary-conditioned normalizing flows applied to fermionic wave functions
Published 2024-12-01Get full text
Article -
429
-
430
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review
Published 2025-03-01“…Key cryptographic techniques such as homomorphic encryption, secure multiparty computation, and quantum cryptography have gained prominence in AI security. …”
Get full text
Article -
431
Beyond Fiber: Toward Terahertz Bandwidth in Free-Space Optical Communication
Published 2025-03-01Get full text
Article -
432
Secure Lattice-Based Signature Scheme for Internet of Things Applications
Published 2025-01-01“…Additionally, the development of quantum computers has directed attention towards lattice-based cryptography. …”
Get full text
Article -
433
A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey
Published 2024-11-01Get full text
Article -
434
ON-OFF neuromorphic ISING machines using Fowler-Nordheim annealers
Published 2025-03-01Get full text
Article -
435
Traversable AdS wormhole via non-local double trace or Janus deformation
Published 2025-04-01Get full text
Article -
436
Chaotic perturbations of solitons in complex conformable Maccari system
Published 2025-03-01“…This key model has numerous applications in several disciplines such as hydrodynamics, optics, quantum mechanics and plasma physics. The proposed gBEM converts the CCMS into a set of nonlinear ordinary differential equations (NODEs) to construct fresh plethora of soliton solutions in the form of rational, trigonometric, hyperbolic, and exponential functions. …”
Get full text
Article -
437
Greybody factor for an electrically charged regular-de Sitter black holes in d-dimensions
Published 2025-04-01“…These results provide insights into how modifications to classical black hole solutions in higher dimensions, through the inclusion of non-linear electrodynamics, impact their quantum emission properties.…”
Get full text
Article -
438
Pauli decomposition via the fast Walsh-Hadamard transform
Published 2025-01-01“…The decomposition of a square matrix into a sum of Pauli strings is a classical pre-processing step required to realize many quantum algorithms. Such a decomposition requires significant computational resources for large matrices. …”
Get full text
Article -
439
A Survey on Distributed Denial-of-Service Attack Mitigation for 5G and Beyond
Published 2025-01-01Get full text
Article -
440