Results 51 to 60 of about 450 (229)
Contact Lens with Moiré Patterns for High‐Precision Eye Tracking
This work presents a passive contact lens for high‐precision eye tracking, integrating a microscopic moiré grating label. The parallax‐induced shift of macroscopic moiré patterns enables angle measurement with 0.28° precision using a standard camera under ambient light.
Ilia M. Fradkin +11 more
wiley +1 more source
Predicting Atomic Charges in MOFs by Topological Charge Equilibration
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi +2 more
wiley +1 more source
Research on data encryption system and technology for cloud storage
To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic ...
Peiyi HAN +5 more
doaj +2 more sources
PREdicting LNP In Vivo Efficacy (PRELIVE) framework enables the prediction of lipid nanoparticle (LNPs) organ‐specific delivery through dual modeling approaches. Composition‐based models using formulation parameters and protein corona‐based models using biological fingerprints both achieve high predictive accuracy across multiple organs.
Belal I. Hanafy +3 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul +5 more
doaj +1 more source
Conductance‐Dependent Photoresponse in a Dynamic SrTiO3 Memristor for Biorealistic Computing
A nanoscale SrTiO3 memristor is shown to exhibit dynamic synaptic behavior through the interaction of local electrical and global optical signals. Its photoresponse depends quantitatively on the conductance state, which evolves and decays over tunable timescales, enabling ultralow‐power, biorealistic learning mechanisms for advanced in‐memory and ...
Christoph Weilenmann +8 more
wiley +1 more source
Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things
With the support of cloud computing, the scalability of the information-centric Internet of Things (IC-IoT) can be increased greatly. In the cloud-supported IC-IoT, how to make search more secure and efficient is a key issue to deal with.
Zhitao Guan +5 more
doaj +1 more source
A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing
The sharing economy has greatly promoted the rapid development and application of spatial crowdsourcing. Although privacy-preserving spatial task matching as an indispensable part has been extensively explored, existing schemes cannot be deployed into ...
Fulin Zhou +4 more
doaj +1 more source

