Results 61 to 70 of about 148,669 (285)

Engineering of Glioblastoma‐Derived Biomimetic Vesicles and Their Structural and Molecular Features

open access: yesAdvanced Healthcare Materials, EarlyView.
ABSTRACT Biomimetic nanosystems and vesicles have arisen as a novel approach to design vesicular transport systems with diverse therapeutic potential. The ‘biomimetic’ strategy involves the integration of cell membrane components into lipid bilayers, conferring them with biological properties originating from the cell of origin. Until now, most studies
Noelia Hernández‐Lobato   +6 more
wiley   +1 more source

Software Library for Authorship Identification

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2015
The aim of this paper is to review some methods for text authorship attribution and to discuss the development of a software library with tools for automatic authorship attribution.
Ivan Ivanov   +4 more
doaj   +1 more source

Computability, Notation, and de re Knowledge of Numbers

open access: yesPhilosophies, 2022
Saul Kripke once noted that there is a tight connection between computation and de re knowledge of whatever the computation acts upon. For example, the Euclidean algorithm can produce knowledge of which number is the greatest common divisor of two ...
Stewart Shapiro   +2 more
doaj   +1 more source

A Long‐Lived Human Neurovascular PENTA Culture Model Captures Incomplete Vascular Repair and Glia‐Associated Signaling After Traumatic Brain Injury

open access: yesAdvanced Healthcare Materials, EarlyView.
A long‐lived, five‐cell‐type human neurovascular (PENTA) model recreates vascular disorganization and incomplete repair after traumatic brain injury (TBI). By integrating endothelial, glial, neuronal, and immune components within a 3D scaffold, the platform enables time‐resolved analysis of neurovascular remodeling and provides a human‐relevant system ...
Daniel S. Hinrichsen   +6 more
wiley   +1 more source

Algorithms on Grammar-Compressed Strings [PDF]

open access: yes, 2011
Grammar based compression, where one replaces a long string by a small contextfree grammar that generates the string, is a simple and powerful paradigm that captures many of the popular compression schemes, including the Lempel-Ziv family, Run-Length Encoding, Byte-Pair Encoding, Sequitur and Re-Pair.
openaire   +1 more source

Sublinear Algorithms for Approximating String Compressibility [PDF]

open access: yesAlgorithmica, 2007
To appear in the proceedings of RANDOM ...
Sofya Raskhodnikova   +3 more
openaire   +6 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Superionic Amorphous Li2ZrCl6 and Li2HfCl6

open access: yesAdvanced Materials, EarlyView.
Amorphous Li2HfCl6 and L2ZrCl6 are shown to be promising solid‐state electrolytes with predicted ionic conductivities >20 mS·cm−1. Molecular dynamics simulations with machine‐learning force fields reveal that anion vibrations and flexible MCl6 octahedra soften the Li coordination cage and enhance mobility. Correlation between Li‐ion diffusivity and the
Shukai Yao, De‐en Jiang
wiley   +1 more source

Evolution of Materials and Device Stacks for HfO2‐Based Ferroelectric Memories

open access: yesAdvanced Materials Interfaces, EarlyView.
This review summarizes engineering strategies for HfO2 based ferroelectric memories with focus on FeCAP and FeFET structures. It describes how dopant design, stress effects, and interface engineering improve the bulk ferroelectric response. It further discusses how channel engineering supports reliable memory characteristics and scalable integration ...
Eunjin Kim, Jiyong Woo
wiley   +1 more source

Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model

open access: yesTelecom
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust ...
Ala’a Talib Khudhair   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy