Results 131 to 140 of about 106,669 (289)

Controlling Photochromism of Donor‐Acceptor Stenhouse Adducts on Micro‐Dot Arrays Beyond Human‐Eyes Resolution for Dynamic Light Encryption

open access: yesAdvanced Science, EarlyView.
This study presents a micro‐dot array strategy for dynamic light encryption, utilizing DASA‐based photochromism with resolution beyond human‐eye capacity. By precisely controlling isomerization kinetics, the method reveals multi‐layered encrypted information under specific light irradiation, enhancing information security and anti‐counterfeiting ...
Hongtao Hu   +10 more
wiley   +1 more source

SSI-MedRx: A fraud-resilient healthcare system based on blockchain and SSI

open access: yesBlockchain: Research and Applications
Today, healthcare fraud poses a significant issue, encompassing everything from falsified billing claims and phantom services to the excessive prescription of opioid medications and medical identity theft.
Meriem Guerar   +4 more
doaj   +1 more source

Data‐Driven Modeling of Composition–Processing–Microstructure Relations for Recycled Aluminum Cast Alloys

open access: yesAdvanced Science, EarlyView.
Interpretable machine learning reveals how composition and processing govern the formation and microstructural burden of Fe‐rich intermetallic compounds in recycled Al–Si–Fe–Mn alloys. By separating morphology selection from morphology‐conditioned burden partitioning, this framework shows that identical Fe contents can yield different intermetallic ...
Jaemin Wang   +2 more
wiley   +1 more source

SpaMode: A Broadly Applicable Framework for Deciphering Spatial Multi‐Omics Using Multimodal Mixture of Disentangled Experts

open access: yesAdvanced Science, EarlyView.
SpaMode introduces a versatile framework for spatial multi‐omics integration across vertical, horizontal, and mosaic scenarios. By disentangling modality‐invariant and variant features through a mixture‐of‐experts mechanism, it adaptively reconfigures spatially heterogeneous signals.
Xubin Zheng   +6 more
wiley   +1 more source

Lightweight Fault-Resilient KLEIN Cipher for IoT Encryption

open access: yesIEEE Access
The KLEIN lightweight block cipher provides an effective encryption method suitable for IoT devices with limited computational resources, memory, and energy capacity.
Nada Maatallah   +4 more
doaj   +1 more source

Atomically Modulating Competing Exchange Interactions in Centrosymmetric Skyrmion Hosts GdRu2X2 (X = Si and Ge)

open access: yesAdvanced Electronic Materials, EarlyView.
Our work bridges the gap between skyrmion discovery and material design by demonstrating how atomic‐scale control of exchange interactions enables tunable skyrmion phase transitions in centrosymmetric magnetic metals. ABSTRACT Magnetic skyrmions are topologically protected spin states that hold promise for shaping the future of electronics.
Dasuni N. Rathnaweera   +9 more
wiley   +1 more source

Why Don’t You Let the Light In? Developing Radiant Patterns for a Critical Game Aiming Player Empowerment

open access: yesJournal on Interactive Systems
The exponential growth of the digital games industry has intensified the use of Deceptive Patterns (DPs) – design strategies that, while profitable, undermine players’ psychological well-being by frustrating their needs for autonomy, competence, and ...
Luiz Santos Filho   +3 more
doaj   +1 more source

Efficient In‐Hardware Matrix–Vector Multiplication and Addition Exploiting Bilinearity of Schottky Barrier Transistors Processed on Industrial FDSOI

open access: yesAdvanced Electronic Materials, EarlyView.
ABSTRACT Machine learning and Artificial Intelligence (AI) tasks have stretched traditional hardware to its limits. In‐hardware computation is a novel approach that aims to run complex operations, such as matrix–vector multiplication, directly at the device level for increased efficiency.
Juan P. Martinez   +10 more
wiley   +1 more source

Culture Clash: When Deceptive Design Meets Diverse Player Expectations

open access: yesCompanion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play
Deceptive game designs that manipulate players are increasingly common in the gaming industry, but the impact on players is not well studied. While studies have revealed player frustration, there is a gap in understanding how cultural attributes affect the impact of deceptive design in games.
Hilda Hadan   +3 more
openaire   +2 more sources

Safety of Sodium‐Ion Batteries: Evaluation and Perspective from Component Materials to Cells, Modules, and Packs

open access: yesAdvanced Energy Materials, EarlyView.
This review provides a bottom‐up evaluation of sodium‐ion battery safety, linking material degradation mechanisms, cell engineering parameters, and module/pack assembly. It emphasizes that understanding intrinsic material stability and establishing coordinated engineering control across hierarchical levels are vital for preventing degradation coupling ...
Won‐Gwang Lim   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy