Results 101 to 110 of about 434,441 (275)
Endogenous Aggregate Elasticity of Substitution [PDF]
In the literature studying aggregate economies the aggregate elasticity of substitution (AES) between capital and labor is often treated as a constant or “deep” parameter. This view contrasts with the conjecture put forward by Arrow et al.
Chris Papageorgiou, Kaz Miyagiwa
core
Prospective evaluation of low-dose ketoconazole plus hydrocortisone in docetaxel pre-treated castration-resistant prostate cancer patients. [PDF]
BackgroundKetoconazole is a well-known CYP17-targeted systemic treatment for castration-resistant prostate cancer (CRPC). However, most of the published data has been in the pre-chemotherapy setting; its efficacy in the post-chemotherapy setting has not ...
Beckett, LA +6 more
core
Degradable Polyphosphoester (PPE) gradient copolymers (GCPs) are synthesized via one‐pot copolymerization. We show that GCPs self‐assemble into nanostructures like polymersomes, effectively mimicking the behavior of traditional BCPs. The gradient strength is key, with softer gradients favoring micelles.
Suna Azhdari +7 more
wiley +1 more source
Agri-Environmental Schemes and Grassland Biodiversity: Another Side of the Coin [PDF]
In this paper part of the existing Agri-Environmental Schemes (AES) of the European Union are evaluated by using data on county level instead of applying field studies.
Angela Münch
core
Fluorine‐Free Soft Nanocomposites for High‐Speed Liquid Impact Repellence
Fluorine‐free soft nanocomposite coatings are developed using silicone oil‐mediated mechanical‐stiffness control, enabling ‘dry’ liquid‐repellent surfaces that resist high‐speed water jet impacts up to ∼60 m/s. By tuning nanoparticle loading and oil content, the coatings also achieve >90% optical transparency, amphiphobicity with impact resistance to ...
Priya Mandal +4 more
wiley +1 more source
Application of Classical and Genomic Cryptography on Textual Dataset
Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. Cryptographic algorithms use
İbrahim Türkoğlu, Alev Kaya
doaj +1 more source
Integration of Low‐Voltage Nanoscale MoS2 Memristors on CMOS Microchips
This article presents the first monolithic integration of nanoscale MoS2‐based memristors into the back‐end‐of‐line of foundry‐fabricated CMOS microchips in a one‐transistor‐one‐resistor (1T1R) architecture. The MoS2‐based 1T1R cells exhibit forming‐free, nonvolatile resistive switching with ultra‐low operating voltages, low cycle‐to‐cycle variability ...
Jimin Lee +16 more
wiley +1 more source
Design of a secure encryption circuit for SHE specification
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj +1 more source
Accelerated Discovery of High Performance Ni3S4/Ni3Mo HER Catalysts via Bayesian Optimization
Integrated workflow accelerates the catalyst discovery of hydrogen evolution reaction via Bayesian optimization. An experiment‐trained surrogate model proposes synthesis conditions, guiding iterative refinement using electrochemical performance metrics.
Namuersaihan Namuersaihan +9 more
wiley +1 more source
Optoelectronic synaptic devices based on solution‐processed molecular telluride GST‐225 phase‐change inks are demonstrated for three‐factor learning. A global optical signal broadcast through a silicon waveguide induces non‐volatile conductance updates exclusively in locally electrically flagged memristors.
Kevin Portner +14 more
wiley +1 more source

