Results 61 to 70 of about 114,269 (316)
Ice Lithography: Recent Progress Opens a New Frontier of Opportunities
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang +9 more
wiley +1 more source
Advancements in detecting Deepfakes: AI algorithms and future prospects − a review
The rise of Deepfake technology in the information age provided significant challenges in ensuring the reliability and authenticity of digital media content.
Laishram Hemanta Singh +2 more
doaj +1 more source
Strain‐Activated Photo‐Dehalogenation Unlocks Low‐Energy One and Two‐Photon 3D Microfabrication
5,14‐NMI‐Cz acts, conversely to its 7,10‐NMI‐Cz(7,10‐'dibromo‐2‐(2,6‐diisopropylphenyl)‐1H‐benzo[lmn]carbazolo[9,1‐bc][2,8]phenanthroline‐1,3(2H)‐dione) counterpart, as modular photoinitiator with panchromatic photoactivity, featuring a weak C–Br bond from geometric strain for efficient Type I & II initiation. These studies demonstrate applicability of
Kacper Piskorz +10 more
wiley +1 more source
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee +9 more
wiley +1 more source
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML) techniques to address the challenges and vulnerabilities in blockchain networks.
K. Venkatesan, Syarifah Bahiyah Rahayu
doaj +1 more source
Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Commitment schemes (CSs) are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols.
Thomas Lorünser +2 more
doaj +1 more source
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. [PDF]
Edu AS, Agoyi M, Agozie D.
europepmc +1 more source
Securing digital documents using digital watermarking
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too.
Awad Kadhim Hammoud +2 more
openaire +2 more sources
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed +6 more
wiley +1 more source
Key Prediction Security of Keyed Sponges
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation.
Bart Mennink
doaj +1 more source

