Results 151 to 160 of about 755,843 (383)
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine +5 more
wiley +1 more source
Dehua Liao,1 Jiwen Zhang,1,2 Ting Yan,1 Yun Chen,1 Yilan Fu,1 Ning Xie,3,* Minghui Long1,* 1Department of Pharmacy, Hunan Cancer Hospital, the Affiliated Cancer Hospital of Xiangya School of Medicine, Central South University, Changsha, People’s ...
Liao D +6 more
doaj
Design and implementation of solid state drive based on AES and SM4 encryption
Secure storage of hard drives is a core issue in solid state disk related technologies. Based on the SATA interface, a hardware module is proposed to implement multiple encryption algorithms for SSD storage data encryption and decryption in the design of
Wang Lijuan +4 more
doaj +1 more source
Comparative Studies of Arisima Takeo's 『ARU ONNA』 and GaeJoo Park's 『SOON AE BO』
김정현, YOON IL
openalex +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Dado un entero positivo n se construye un algoritmo que asocia a cada entero positivo m, con 0 ¿ m ¿ n!-1, una permutación en n-1 pasos. De hecho, el algoritmo defi ne una función biyectiva que va del conjunto de los naturales al conjunto de las ...
Víctor Manuel Silva García +4 more
doaj
Multi-level charging spot data encryption method combined K-anonymity with AES
In response to the privacy and security issues of a large amount of user charging data brought by the rapid development of new energy vehicles, this paper proposes a multi-level charging spot data encryption method that combines K-anonymity with advanced
LIU Huiying +4 more
doaj +1 more source
Beyond Earth: Resilience of Quasi‐2D Perovskite Solar Cells in Space
In the article (DOI: 10.1002/adma.202520433), Christoph Putz and co‐workers demonstrate rigid quasi‐2D perovskite solar cells operating in low Earth orbit, delivering stable power for more than 100 days under real‐space conditions. In‐orbit performance is correlated with extensive ground‐based thermal and proton‐irradiation studies on rigid and ...
Christoph Putz +17 more
wiley +1 more source
Brumitt, J, Heiderscheit, B, Manske, R, Niemuth, PE, Mattocks, A, and Rauh, MJ. Preseason functional test scores are associated with future sports injury in female collegiate athletes.
Brumitt, Jason +5 more
core

