Results 101 to 110 of about 80,103 (295)

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

KEDUDUKAN DAN KEKUATAN PEMBUKTIAN DEEPFAKE DALAM PROSES PERSIDANGAN

open access: yesAl-Adl
Technological advancement has extended to the rapid development of artificial intelligence (AI), which has the capacity to facilitate human work and activities.
Soffyan Angga Fahlani   +3 more
doaj   +1 more source

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

Key Management Building Blocks for Wireless Sensor Networks [PDF]

open access: yes, 2007
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core   +2 more sources

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Twisted MoS2 Bilayers as Functional Elements in Memtransistors: Hysteresis, Optical Signatures, and Photocurrent Kinetics

open access: yesAdvanced Electronic Materials, EarlyView.
ABSTRACT Layered 2D materials are considered as promising for memristive applications due to their ultimate vertical scalability compared to conventional semiconductor films and pronounced hysteresis properties. Bias‐resolved Raman and Photoluminescence mapping is used to quantify strain from phonon shifts and carrier density from the exciton‐trion ...
Vladislav Kurtash   +4 more
wiley   +1 more source

Topological Materials and Related Applications

open access: yesAdvanced Electronic Materials, EarlyView.
This review covers topological materials—including topological insulators, quantum valley Hall and quantum spin Hall insulators, and topological Weyl and Dirac semimetals—as well as their most recent advancements in fields such as spintronics, electronics, photonics, thermoelectrics, and catalysis.
Carlo Grazianetti   +9 more
wiley   +1 more source

Chip and Skim: cloning EMV cards with the pre-play attack [PDF]

open access: yes, 2012
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross   +4 more
core   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]

open access: yes, 2016
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core   +1 more source

Home - About - Disclaimer - Privacy