Results 61 to 70 of about 53,319 (274)

Effects of Crushed Oyster Shell on Strength and Durability of Marine Concrete Containing Fly Ash and Blastfurnace Slag

open access: yesMedžiagotyra, 2019
A large quantity of oyster shell is generated every year in coastal regions. Instead of being dumped as waste, after crushing or grinding, oyster shell may be recycled for use in concrete. Herein, the use of crushed oyster shell (COS) in conjunction with
Hai-Yan CHEN   +5 more
doaj   +1 more source

A directed isoperimetric inequality with application to Bregman near neighbor lower bounds

open access: yes, 2015
Bregman divergences $D_\phi$ are a class of divergences parametrized by a convex function $\phi$ and include well known distance functions like $\ell_2^2$ and the Kullback-Leibler divergence.
Chaudhuri Kamalika   +2 more
core   +1 more source

Creativity and destructiveness in art and psychoanalysis [PDF]

open access: yes, 2015
This paper focuses on the creativity of the patient in analysis and compares it to that of the artist. Taking artists’ descriptions of their practices as its starting point, the paper suggests that the relationship between patient and analyst parallels ...
Abella   +24 more
core   +1 more source

Robust Polymer Hydrogels Improve Electric‐Fish‐Inspired Batteries

open access: yesAdvanced Functional Materials, EarlyView.
ABSTRACT Electric‐fish‐inspired hydrogel batteries based on ion‐concentration gradients offer an attractive route to soft power sources; however, the poor mechanical properties of existing hydrogels limit device assembly and performance. Here, we report poly(ethylene glycol) methyl ether acrylate hydrogels that enable ion‐gradient batteries composed of
Nick Zahnd   +5 more
wiley   +1 more source

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings

open access: yesIACR Transactions on Symmetric Cryptology
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj   +1 more source

Polypropylene fibres within concrete with regard to heat induced spalling and reduction in compressive strength [PDF]

open access: yes, 2008
The paper examines the effect of various polypropylene fibre additions (Types 1 and 2 and different fibre volumes) to concrete with regard to explosive spalling when subject to high temperatures similar to that experienced in building or tunnel fires ...
Richardson, Alan
core  

Algorithmic Design of Disordered Networks With Arbitrary Coordination: Application to Biophotonics

open access: yesAdvanced Functional Materials, EarlyView.
Predictive Design of Disordered Networks: Disordered network‐like morphologies are abundant in nature, from cytoskeletal networks to bone structures and chalcogenide glasses. These structures are naturally hard to characterize. A new algorithmic tool extends the established Wooten–Weaire–Winer (WWW) algorithm to valencies above 4.
Florin Hemmann   +3 more
wiley   +1 more source

Bioprinting Organs—Science or Fiction?—A Review From Students to Students

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu   +18 more
wiley   +1 more source

Cube Attacks with Elimination Strategy: Key Recovery Attacks on Trivium

open access: yesIACR Transactions on Symmetric Cryptology
In this paper, we present a novel framework for cube attacks named cube attacks with elimination strategy. The core idea is to find specific key conditions and cubes such that their superpolies under these key conditions can be efficiently computed.
Haoran Li   +4 more
doaj   +1 more source

Comparison of Cube Attacks Over Different Vector Spaces [PDF]

open access: yes, 2015
We generalise the cube attack of Dinur and Shamir and the similar AIDA attack of Vielhaber to a more general higher order differentiation attack, by summing over an arbitrary subspace of the space of initialisation vectors. The Moebius transform can be used for efficiently examining all the subspaces of a big space, similar to the method used by Fouque
Richard Winter   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy