-
481
Anima de Wajdi Mouawad: El trauma y la violencia de la guerra en la construcción identitaria del exiliado
Published 2021-11-01Get full text
Article -
482
Prediction and analysis of 3D hydrofoil and propeller under potential flow using panel method
Published 2016-01-01Get full text
Article -
483
-
484
-
485
Especies Silvestres de Amaranthus de Nuevo Léon, México: I. Aspectos ecológicos y botánicos
Published 2014-08-01Get full text
Article -
486
-
487
-
488
Quantum Cryptography—A Simplified Undergraduate Experiment and Simulation
Published 2022-01-01“…In the proposed experiment, key principles from the BB84 protocol, used in quantum cryptography, are emulated using an optical apparatus and computational scripts independently.…”
Get full text
Article -
489
Current approaches to prophylaxis and treatment of travelers’ diarrhea
Published 2018-08-01Get full text
Article -
490
Sliding Mode Control Based on High Gain Observer for Electro-Hydraulic Servo System
Published 2023-01-01Get full text
Article -
491
-
492
Undergraduate student construction and interpretation of graphs in physics lab activities
Published 2016-02-01Get full text
Article -
493
-
494
Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s
Published 2015-01-01“…A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. …”
Get full text
Article -
495
Economics of agritourism development: An Iranian experience
Published 2020-04-01Get full text
Article -
496
-
497
Current choices and prospects in management of postoperative esophageal cancer patients
Published 2019-01-01Get full text
Article -
498
Problematic Issues of Estimated Liabilities in Payroll Accounting
Published 2019-01-01Get full text
Article -
499
-
500
Entanglement and teleportation in quantum key distribution for secure wireless systems
Published 2024-12-01“…The results show that this technique outperforms the standard BB84 protocol. Based on their simulations, this protocol appears to be a promising technique for providing quantum‐level security to next‐generation wireless communication systems.…”
Get full text
Article