Results 81 to 90 of about 1,678,458 (327)
Anthropogenic and environmental factors associated with koala deaths due to dog attacks and vehicle collisions in South-East Queensland, Australia, 2009–2013 [PDF]
Ravi Dissanayake +4 more
openalex +1 more source
Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A. +3 more
core +1 more source
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj +3 more sources
Security and defence of mobile systems under impact [PDF]
The Group “Dynamics and Fracture of Structural Elements” offers its experience in Solid Mechanics analysis for the study of the impact protection of vehicles, aircrafts and persons.
Arias Hernández, Ángel +1 more
core +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models [PDF]
Minghang Deng, Zhong Zhang, Junming Shao
openalex +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege +2 more
openaire +1 more source
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources
This review discusses cellulose‐based hydrogels technology, analyzes their application progress in physiological signal monitoring, and explores the effects of pretreatment, crosslinking, and molding methods on gel performance, to provide valuable insights into the efficient utilization of plant fibers and the environmentally friendly development of ...
Zhiming Wang +8 more
wiley +1 more source

