Results 81 to 90 of about 4,817 (211)
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj
Opportunities and challenges in protein structure prediction
Abstract Deep learning methods, particularly exemplified by AlphaFold2, have revolutionized the field of protein structure prediction—an achievement recognized by the 2024 Nobel Prize in Chemistry awarded to its core developers. Despite this remarkable achievement, the broader protein folding problem is far from solved. Key challenges—each representing
Wenkai Wang +3 more
wiley +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
A research on cross‐chain and interoperation methods of fusion protocol
At present, cross‐chain technology and cross‐chain system pay more attention to cross‐chain security and performance, and have shown great improvement in security, scalability and efficiency. However, the generality of cross‐chain technology in different
Li Ming +4 more
doaj +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
Multi-language oriented automatic realization method for cryptographic protocols
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI +3 more
doaj +2 more sources
We demonstrate true random number generator (TRNG) circuits based on a 2D hBN threshold switching memristor integrated with passive components. Leveraging its intrinsic stochastic behavior, the spike generator produces output fluctuations directly converted into random bits via a comparator.
Yooyeon Jo +5 more
wiley +1 more source
Deterministic hBN Bubbles as a Versatile Platform for Studies on Single‐Photon Emitters
Single‐photon emitters (SPEs) in hBN are promising for quantum technologies; however, in exfoliated samples their activation is required, limiting reproducibility of previous studies. This work introduces a large‐area MOVPE‐grown hBN platform that hosts SPEs without prior activation.
Piotr Tatarczak +8 more
wiley +1 more source

