Results 211 to 220 of about 58,616 (313)
A Programmed DNA Dynamic Assembly-Guided Molecular Amplifier for Authentic Information Decryption. [PDF]
Yang N+9 more
europepmc +1 more source
IMCRYPTO: An In-Memory Computing Fabric for AES Encryption and Decryption
Dayane Reis+3 more
openalex +2 more sources
This study presents the first systematic evaluation of interactions between astrocytes and Ti3C2TX MXene flakes, a 2D nanomaterial with emerging neuroelectronic applications. Using a multimodal approach, including viability assays, morphometric analysis, and calcium imaging, this work demonstrates high biocompatibility and preserved function in ...
Dimitris Boufidis+7 more
wiley +1 more source
A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata. [PDF]
Sun S+5 more
europepmc +1 more source
Image Encryption and Decryption Based on Chaotic Algorithm
Yue Hu, Ruyue Tian
openalex +2 more sources
Although defect‐rich Multi‐walled Carbon Nanotubes (MWCNTs) are generally associated with reduced electronic conductivity, our findings uncover a different role: they act as interfacial mediators in Silicon (Si) negative electrode‐based lithium‐ion batteries. Their defect sites and surface functional groups reinforce particle contact, markedly boosting
Leyla Ünal+4 more
wiley +1 more source
THE PLACE OF GROUP THEORY ON RECENT TRENDS IN INFORMATION TRANSMISSION- ENCRYPTION AND DECRYPTION
Samuel Hwere Tsok+2 more
openalex +1 more source
Deep Learning Analysis of Solid‐Electrolyte Interphase Microstructures in Lithium‐Ion Batteries
A transformer‐based deep learning model is developed for segmenting and analyzing high‐resolution TEM images of the solid‐electrolyte interphase (SEI) in lithium‐ion batteries. The model is trained on DFT‐based simulated images and predicts SEI grain and grain boundaries, revealing key microstructural features that govern ion transport and degradation.
Ishraque Zaman Borshon+4 more
wiley +1 more source
An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
Jing Li+4 more
openalex +2 more sources
A Double-Key Based Encryption-Decryption Process for Stronger Secured Message Transactions
Md. Ismail Jabiullah+2 more
openalex +2 more sources