Results 111 to 120 of about 211,629 (261)

Bridging Mechanical Properties with Atomic Structures of Polymorphic α‐Synuclein Fibrils by Single‐Molecule Analysis and Molecular Dynamics Simulations

open access: yesAggregate, EarlyView.
α‐Synuclein fibrils exhibit distinct mechanical properties influencing their neurotoxicity and pathogenicity in synucleinopathies like Parkinson's disease. Combining optical tweezers and molecular dynamics simulations, this study builds the structure–mechanics relationships of wild‐type and two disease‐associated mutants E46K and A53T α‐Synuclein ...
Lulu Bi   +9 more
wiley   +1 more source

Cryptanalysis of the Hash Function LUX-256 [PDF]

open access: yes, 2008
LUX is a new hash function submitted to NIST\u27s SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector.
Dengguo Feng, Shuang Wu, Wenling Wu
core  

An experimental flow regime map to dynamically structure gas–solid bubbling fluidized beds

open access: yesAIChE Journal, EarlyView.
Abstract Employing oscillatory gas flows to create ordered bubble dynamics in fluidized beds represents a promising approach in reactor design, enhancing efficiency, scalability, and control. This study reports an extensive experimental campaign that identifies the operational regime for structuring Geldart B fluidized beds, introducing a novel pattern
Kaiqiao Wu   +3 more
wiley   +1 more source

Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs

open access: yesIEEE Access, 2018
A vehicular ad hoc network (VANET) is a collection of mobile vehicles that aids roadside communication through vehicle-to-vehicle and vehicle-to-infrastructure operation modes.
A.M.R. Tolba
doaj   +1 more source

On the security of the Blockchain Bix Protocol and Certificates

open access: yes, 2016
The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with his public key, hence providing a service similar to that of a PKI but without the need of a CA.
Longo, Riccardo   +3 more
core   +1 more source

A Study on the Effect of Structural Compliance Placing in Soft Contact/Collision Properties of Multirotor Micro Aerial Vehicles

open access: yesAdvanced Intelligent Systems, EarlyView.
This article answers the question “Where is the best place to apply compliance in a multirotor micro aerial vehicle to make it more collision‐resilient?” by analyzing the output data of more than 1200 drone collision tests for four main configurations of micro‐quadcopters each possessing a unique softness layout of physical frame.
Amirali Abazari   +3 more
wiley   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

D‐HAT: A Diatom‐Inspired Structure for a Helmet Concept Against Trauma

open access: yesAdvanced Intelligent Systems, EarlyView.
This study introduces a helmet liner concept inspired by diatom exoskeletons. Using finite element analysis, 3D printing, and testing, the authors demonstrate its energy absorption capabilities, providing impact resistance comparable to current materials while offering greater multifunctionality.
Ludovico Musenich   +3 more
wiley   +1 more source

Au(I)‐, Au(II)‐, Au(III)‐Fluoride Complexes: Synthesis and Applications in Organic Transformations

open access: yesAngewandte Chemie, EarlyView.
In this review, the synthesis and reactivity of organometallic gold‐fluoride complexes in oxidation states of Au(I), Au(II), and Au(III) are summarised. A widespread interest in C−C and C−F coupling reactions has resulted in several developments of these complexes with a range of supporting ligands, which has enabled their reactivity to be studied ...
Alexi T. Sedikides   +3 more
wiley   +2 more sources

Simple Electromagnetic Analysis in Cryptography

open access: yesInternational Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, 2012
The article describes the main principle and methods of simple electromagnetic analysis and thus provides an overview of simple electromagnetic analysis.The introductions chapters describe specific SPA attack used visual inspection of EM traces, template
Zdenek Martinasek   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy