Results 61 to 70 of about 148,669 (285)
Engineering of Glioblastoma‐Derived Biomimetic Vesicles and Their Structural and Molecular Features
ABSTRACT Biomimetic nanosystems and vesicles have arisen as a novel approach to design vesicular transport systems with diverse therapeutic potential. The ‘biomimetic’ strategy involves the integration of cell membrane components into lipid bilayers, conferring them with biological properties originating from the cell of origin. Until now, most studies
Noelia Hernández‐Lobato +6 more
wiley +1 more source
Software Library for Authorship Identification
The aim of this paper is to review some methods for text authorship attribution and to discuss the development of a software library with tools for automatic authorship attribution.
Ivan Ivanov +4 more
doaj +1 more source
Computability, Notation, and de re Knowledge of Numbers
Saul Kripke once noted that there is a tight connection between computation and de re knowledge of whatever the computation acts upon. For example, the Euclidean algorithm can produce knowledge of which number is the greatest common divisor of two ...
Stewart Shapiro +2 more
doaj +1 more source
A long‐lived, five‐cell‐type human neurovascular (PENTA) model recreates vascular disorganization and incomplete repair after traumatic brain injury (TBI). By integrating endothelial, glial, neuronal, and immune components within a 3D scaffold, the platform enables time‐resolved analysis of neurovascular remodeling and provides a human‐relevant system ...
Daniel S. Hinrichsen +6 more
wiley +1 more source
Algorithms on Grammar-Compressed Strings [PDF]
Grammar based compression, where one replaces a long string by a small contextfree grammar that generates the string, is a simple and powerful paradigm that captures many of the popular compression schemes, including the Lempel-Ziv family, Run-Length Encoding, Byte-Pair Encoding, Sequitur and Re-Pair.
openaire +1 more source
Sublinear Algorithms for Approximating String Compressibility [PDF]
To appear in the proceedings of RANDOM ...
Sofya Raskhodnikova +3 more
openaire +6 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Superionic Amorphous Li2ZrCl6 and Li2HfCl6
Amorphous Li2HfCl6 and L2ZrCl6 are shown to be promising solid‐state electrolytes with predicted ionic conductivities >20 mS·cm−1. Molecular dynamics simulations with machine‐learning force fields reveal that anion vibrations and flexible MCl6 octahedra soften the Li coordination cage and enhance mobility. Correlation between Li‐ion diffusivity and the
Shukai Yao, De‐en Jiang
wiley +1 more source
Evolution of Materials and Device Stacks for HfO2‐Based Ferroelectric Memories
This review summarizes engineering strategies for HfO2 based ferroelectric memories with focus on FeCAP and FeFET structures. It describes how dopant design, stress effects, and interface engineering improve the bulk ferroelectric response. It further discusses how channel engineering supports reliable memory characteristics and scalable integration ...
Eunjin Kim, Jiyong Woo
wiley +1 more source
Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust ...
Ala’a Talib Khudhair +2 more
doaj +1 more source

