Results 61 to 70 of about 10,250 (292)

Sub‐Unit‐Cell Logic Governs Transport in TPMS Architectures

open access: yesAdvanced Science, EarlyView.
ABSTRACT Next‐generation energy, thermal, and chemical systems require architectures capable of highly efficient transport across multiple length scales. Triply periodic minimal surfaces (TPMS), first conceptualized in 1865, offer inherently scalable geometries with exceptional transport potential, yet mechanistic links between topology and performance
Haozhang Zhong   +16 more
wiley   +1 more source

Bioinspired Adaptive Leg‐Claw Enables Robust Perching and Grasping for UAVs

open access: yesAdvanced Science, EarlyView.
Inspired by owl limb morphology and bat roosting behavior, this study presents a bioinspired adaptive leg‐claw mechanism that enables UAVs to perform robust and versatile perching and grasping. The design integrates a four‐link tibial structure, tension‐driven deformable feet, and active control, enabling stable perching on various branches and ...
Tianyu Cheng   +6 more
wiley   +1 more source

Design of Optical Transducer for Recognition of Biomolecular Interactions between Bacterial Lipopolysaccharides and Amino Acids

open access: yesAdvanced Science, EarlyView.
A deep comprehension of biomolecular phenomena at interfaces is significant with their fundamental and practical importance. Our experimental and theoretical investigations reveal that specific amino acids (glutamic acid and aspartic acid) exhibit an orientational coupling with liquid crystals, which can recognize and optically report the interfacial ...
Yena Choi   +10 more
wiley   +1 more source

Meter‐Scale Ultra‐Large‐Area Flexible Electroluminescent Devices Enabled by Aerosol Spraying

open access: yesAdvanced Science, EarlyView.
This work presents a simple aerosol spraying method using modified luminescent ink to fabricate meter‐scale flexible alternating current electroluminescent (ACEL) devices. Enhanced particle dispersibility and film uniformity yield impressive brightness up to 500 cd m−2, positioning these devices as effective luminous navigation signs for industrial ...
Hao Song   +8 more
wiley   +1 more source

On weakly prime-additive numbers with length $4k+3$

open access: yesComptes Rendus. Mathématique
If a positive integer $n$ has at least two distinct prime divisors and can be written as $n=p_1^{\alpha _1}+\dots +p_t^{\alpha _t}$, where $p_13$, there exist infinitely many weakly prime-additive numbers $n$ with $m\mid n$ and $n=p_1^{\alpha _1}+\dots ...
Fang, Jin-Hui, Xue, Fang-Gang
doaj   +1 more source

Parallel Implementation of Exact Matrix Computation Using Multiple P-adic Arithmetic [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2013
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage
Xinkai Li, Chao Lu, Jon A. Sjogren
doaj   +1 more source

Poisson statistics via the Chinese Remainder Theorem

open access: yesAdvances in Mathematics, 2008
32 pages.
Granville, Andrew, Kurlberg, Pär
openaire   +3 more sources

Prediction of Structural Stability of Layered Oxide Cathode Materials: Combination of Machine Learning and Ab Initio Thermodynamics

open access: yesAdvanced Energy Materials, EarlyView.
In this work, we developed a phase‐stability predictor by combining machine learning and ab initio thermodynamics approaches, and identified the key factors determining the favorable phase for a given composition. Specifically, a lower TM ionic potential, higher Na content, and higher mixing entropy favor the O3 phase.
Liang‐Ting Wu   +6 more
wiley   +1 more source

Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system

open access: yesTongxin xuebao, 2022
Aiming at the problem that vehicles in the vehicular ad-hoc network (VANET) system were vulnerable to malicious attacks when communicating with each other on the public network, a mutual authentication key agreement protocol in the VANET was proposed.A ...
Haibo ZHANG   +3 more
doaj   +2 more sources

A new chinese remainder algorithm for image-based encryption

open access: yesRevista Colombiana de Computación, 2009
In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al.
Sergio Duarte   +2 more
doaj  

Home - About - Disclaimer - Privacy