Search results for "Crypt"

showing 10 items of 1111 documents

Molecular topology as a novel approach for drug discovery

2012

Molecular topology (MT) has emerged in recent years as a powerful approach for the in silico generation of new drugs. One key part of MT is that, in the process of drug design/discovery, there is no need for an explicit knowledge of a drug's mechanism of action unlike other drug discovery methods.In this review, the authors introduce the topic by explaining briefly the most common methodology used today in drug design/discovery and address the most important concepts of MT and the methodology followed (QSAR equations, LDA, etc.). Furthermore, the significant results achieved, from this approach, are outlined and discussed.The results outlined herein can be explained by considering that MT r…

Quantitative structure–activity relationshipDrug IndustryDrug discoveryProcess (engineering)Computer sciencebusiness.industryIn silicoQuantitative Structure-Activity RelationshipModels TheoreticalMachine learningcomputer.software_genreField (computer science)Pharmaceutical PreparationsDrug DesignDrug DiscoveryKey (cryptography)AnimalsComputer-Aided DesignHumansData miningArtificial intelligenceExplicit knowledgeMolecular topologybusinesscomputerExpert Opinion on Drug Discovery
researchProduct

A single photon source based on NV centers in diamond nanocrystals

2009

The development of reliable devices to generate single photons is crucial for applications in quantum cryptography, as well as for fundamental quantum optics experiments. Due to their extremely high photostability at room temperature, optically active defects in solids, the so called color centers, are among the most promising candidates. Single NV(nitrogen-vacancy) centers in diamond have been demonstrated to be able to generate single photons and have already shown advantages compared to attenuated laser pulses in a quantum cryptography experiment [1]. The nitrogen-vacancy center (NV center) in diamond consists of a substitutional nitrogen atom and an adjacent vacancy. This complex exhibi…

Quantum opticsMaterials sciencePhotonbusiness.industryDiamondengineering.materialLaserlaw.inventionQuantum cryptographylawSingle-photon sourceengineeringOptoelectronicsPhotonicsbusinessNitrogen-vacancy center
researchProduct

Activating remote entanglement in a quantum network by local counting of identical particles

2019

Quantum information and communication processing within quantum networks usually employs identical particles. Despite this, the physical role of quantum statistical nature of particles in large-scale networks remains elusive. Here, we show that just the indistinguishability of fermions makes it possible a new mechanism of entanglement transfer in many-node quantum networks. This process activates remote entanglement among distant sites, which do not share a common past, by only locally counting identical particles and classical communication. These results constitute the key achievement of the present technique and open the way to a more stable multistage transfer of nonlocal quantum correl…

Quantum protocolsPhysicsQuantum networkQuantum PhysicsProcess (computing)FOS: Physical sciencesQuantum entanglementFermion01 natural sciencesSettore FIS/03 - Fisica Della Materia010305 fluids & plasmasQuantum entanglement[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]0103 physical sciencesQuantum information processingKey (cryptography)Identical particleStatistical physicsQuantum information010306 general physicsQuantum Physics (quant-ph)QuantumIdentical particles
researchProduct

"Table 10" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at low KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct

"Table 13" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in PbPb collisions versus Nch at high KT3.

R lambdaInclusive2760.0Physics::Instrumentation and DetectorsAstrophysics::Earth and Planetary AstrophysicsPB PB --> PI+ XNuclear ExperimentPB PB --> PI- XComputer Science::Cryptography and Security
researchProduct

"Table 11" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"

2014

Gaussian radii and intercept parameters in pp collisions versus Nch at high KT3.

R lambdaInclusiveProton-Proton Scattering7000.0Astrophysics::Earth and Planetary AstrophysicsP P --> PI+ XNuclear ExperimentP P --> PI- XComputer Science::Cryptography and Security
researchProduct

Human body sensing: A pervasive approach by implanted RFID tags

2011

Starting from the physical evidence that passive RFID systems may be used as self-sensing devices, the feasibility of human monitoring by means of implanted tags is here investigated. The key parameters to master with the purpose to enhance the sensitivity of the implanted radiosensor have been theoretically analyzed and numerically applied to a specific medical problem, i.e. the continuous monitoring of liver cancer evolution. Preliminary experimental results with simplified phantoms corroborate the analysis.

RFIDImplanted tagUbiquitous computingComputer sciencebusiness.industryWearable tagRFID sensor Wearable tag Implanted tagReal-time computingContinuous monitoringSettore ING-INF/02 - Campi ElettromagneticisensorHuman monitoringKey (cryptography)RFID sensorSensitivity (control systems)Telecommunicationsbusiness2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)
researchProduct

Passive UHF RFID antennas for sensing applications: Principles, methods, and classifcations

2013

UHF passive radio-frequency identification technology is rapidly evolving from simple labeling of things to wireless pervasive sensing. A remarkable number of scientific papers demonstrate that objects in principle can have their physical properties be remotely tracked and monitored all along their life cycle. The key background is a new paradigm of antenna design that merges together the conventional communication issues with more-specific requirements about sensitivity to time-varying boundary conditions. This paper presents a unified review of the state of the art of the tag-as-sensor problem. Particular care is taken to formalize the measurement indicators and the communication and sens…

RFIDInternet of thingsEngineeringSIMPLE (military communications protocol)business.industrySettore ING-INF/02 - Campi ElettromagneticiCondensed Matter PhysicsSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)antennaVariety (cybernetics)Ultra high frequencyKnowledge baseElectronic engineeringKey (cryptography)WirelessSensitivity (control systems)State (computer science)RFID sensorElectrical and Electronic Engineeringbusinesssensor network
researchProduct

Feature selection using ROC curves on classification problems

2010

Feature Selection (FS) is one of the key stages in classification problems. This paper proposes the use of the area under Receiver Operator Characteristic curves to measure the individual importance of every input as well as a method to discover the variables that yield a statistically significant improvement in the discrimination power of the classification model.

Receiver operating characteristicbusiness.industryFeature extractionKey (cryptography)Feature selectionLinear classifierPattern recognitionArtificial intelligencebusinessMeasure (mathematics)Power (physics)MathematicsThe 2010 International Joint Conference on Neural Networks (IJCNN)
researchProduct

Cost-effective Multiresolution schemes for Shock Computations

2009

Harten's Multiresolution framework has provided a fruitful environment for the development of adaptive codes for hyperbolic PDEs. The so-called cost-effective alternative [4,8,21] seeks to achieve savings in the computational cost of the underlying numerical technique, but not in the overall memory requirements of the code. Since the data structure of the basic algorithm does not need to be modified, it provides a set of tools that can be easily implemented into existing codes and that can be very useful in order to speed up the numerical simulations involved in the testing process that is associated to the development of new numerical schemes.
In this paper we present two different applica…

Reduction (complexity)Set (abstract data type)SpeedupComputer engineeringComputer scienceComputationProcess (computing)Code (cryptography)Data miningData structurecomputer.software_genrecomputerShock (mechanics)ESAIM: Proceedings
researchProduct