Results 91 to 100 of about 133,184 (295)
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks [PDF]
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices.
Udoh, E., Udoh, E.
core
A Roadmap for Plasma‐Enabled Electrocatalysis in Urea Production
A modular plasma—electrochemical platform enables fully electrified urea synthesis from air and CO2 under ambient conditions. This Review integrates plasma oxidation, C─N coupling electrolysis, mechanistic insights, and techno‐economic metrics into a roadmap for scalable, distributed, and renewable fertilizer production.
Jingwen Huang +6 more
wiley +1 more source
Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing [PDF]
Lipeng Chang +3 more
openalex +1 more source
A synthetic protocol for thermally recyclable poly(amide‐imide) aerogels based on Diels–Alder chemistry is presented. Prepared from furan‐modified poly(amide‐imide) and bismaleimide, these aerogels offer thermal superinsulation and excellent thermo‐mechanical performance.
Yufei Xiong +5 more
wiley +1 more source
Study of Solid Particle Erosion on Helicopter Rotor Blades Surfaces
In this study, titanium alloy (Ti-4Al-1.5Mn), magnesium alloy (Mg-Li9-A3-Zn3), or aluminum alloy (Al7075-T6) were used to construct the shell model of helicopter rotor blade to study the solid particle erosion of helicopter rotor blades.
Xupeng Bai +4 more
doaj +1 more source
MXene and MBene nanomaterials show significant potential in addressing critical challenges in biomedicine, applied biology, agriculture, and the environment. From a nano‐agricultural perspective, this relatively young field has witnessed emerging advances towards applications for plant‐immunoengineering, biostimulation, and controlled delivery ...
Alireza Rafieerad +3 more
wiley +1 more source
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core
Adaptive Twisting Metamaterials
This work introduces torque‐controlled twisting metamaterials as a transformative platform for adaptive crashworthiness. By combining multiscale predictive modeling with experimental validation on additively manufactured gyroids, it demonstrates tunable stiffness, collapse stress, and energy absorption.
Mattia Utzeri +6 more
wiley +1 more source
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +1 more source

