Results 121 to 130 of about 717,304 (368)
Application of Classical and Genomic Cryptography on Textual Dataset
Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. Cryptographic algorithms use
İbrahim Türkoğlu, Alev Kaya
doaj +1 more source
This work provides a novel interpretation of the nitrate reduction mechanism on iron oxides (FeOx) by employing constant‐potential density functional calculations and reports the design and synthesis of a robust and high‐performance Fe3O4/Fe‐N4‐C catalyst with remarkable Faradaic efficiency, current density, and stability under practical reaction ...
Qiang Zhou +8 more
wiley +1 more source
Design of a secure encryption circuit for SHE specification
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj +1 more source
Conductance‐Dependent Photoresponse in a Dynamic SrTiO3 Memristor for Biorealistic Computing
A nanoscale SrTiO3 memristor is shown to exhibit dynamic synaptic behavior through the interaction of local electrical and global optical signals. Its photoresponse depends quantitatively on the conductance state, which evolves and decays over tunable timescales, enabling ultralow‐power, biorealistic learning mechanisms for advanced in‐memory and ...
Christoph Weilenmann +8 more
wiley +1 more source
In MOCVD MoS2 memristors, a current compliance‐regulated Ag filament mechanism is revealed. The filament ruptures spontaneously during volatile switching, while subsequent growth proceeds vertically through the MoS2 layers and then laterally along the van der Waals gaps during nonvolatile switching.
Yuan Fa +19 more
wiley +1 more source
Degradable Polyphosphoester (PPE) gradient copolymers (GCPs) are synthesized via one‐pot copolymerization. We show that GCPs self‐assemble into nanostructures like polymersomes, effectively mimicking the behavior of traditional BCPs. The gradient strength is key, with softer gradients favoring micelles.
Suna Azhdari +7 more
wiley +1 more source
A New Key Delivery Method in Wireless Network
The development of networking technologies and the increase of digital devices have made multimedia transmission quick and easy. However, digital data transmission over open communication channels has introduced a number of security implications, such as
Çağatay Ay
doaj
Fluorine‐Free Soft Nanocomposites for High‐Speed Liquid Impact Repellence
Fluorine‐free soft nanocomposite coatings are developed using silicone oil‐mediated mechanical‐stiffness control, enabling ‘dry’ liquid‐repellent surfaces that resist high‐speed water jet impacts up to ∼60 m/s. By tuning nanoparticle loading and oil content, the coatings also achieve >90% optical transparency, amphiphobicity with impact resistance to ...
Priya Mandal +4 more
wiley +1 more source
A Human Neural Tube Model Using 4D Self‐Folding Smart Scaffolds
Induced pluripotent stem cells (iPSCs) exhibit features comparable to the inner cell mass of the human embryo. iPSCs are applied to a novel self‐folding 4D‐Neural Tube (4D‐NT) structure that mimics the neurulation process. This 4D‐NT model recapitulates early events of human neural development and represents a platform to explore neurodevelopmental ...
Claudia Dell'Amico +8 more
wiley +1 more source

