Results 221 to 230 of about 23,383 (317)
Abstract Background The prognostic significance of standardized phase angle (StPhA) and bioelectrical impedance vector analysis (BIVA) remains unclear among hospitalized older individuals. Our study aimed to investigate the prognostic significance of StPhA and BIVA patterns concerning overall survival in hospitalized older patients.
Nahara Oliveira Lima da Silva Diniz+8 more
wiley +1 more source
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
Garima Kaushik
openalex +1 more source
Analysis of the improvements of impregnating and saturating resin flows in microwave‐preheated liquid composite molding. Abstract In liquid composite molding processes, resin preheating is a strategy to reduce the viscosity, which consequently improves resin flow and reduces impregnation time. However, the provision of heat to thermoset systems must be
Vitantonio Esperto+2 more
wiley +1 more source
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
Zhe Liu+2 more
openalex +1 more source
The utilization of the trace normalized stiffness parameter facilitates direct comparison between natural and non‐natural composites, as it acts as a material parameter. This facilitates the reverse calculation of fiber properties. Abstract The use of hemp is becoming increasingly favored due to its low carbon footprint and biodegradability advantages ...
Maria Asun Cantera
wiley +1 more source
Enhancing IoT security with a DNA-based lightweight cryptography system. [PDF]
Aqeel S+4 more
europepmc +1 more source
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over $$\mathrm{GF}(p)$$
Yuan Ma+3 more
openalex +1 more source
Schematic representation of the functionalization, processing steps, and tensile properties of carbon nanotube‐reinforced vinyl ester nanocomposites. Abstract Carbon nanotubes (CNTs) have received significant attention due to their exceptional physical and mechanical properties. Advancements in surface modification techniques have facilitated their use
Yasaman Alaei+4 more
wiley +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A+3 more
europepmc +1 more source