Results 51 to 60 of about 177,129 (337)

Identification of inhibitors of the Salmonella FraB deglycase, a drug target

open access: yesFEBS Open Bio, EarlyView.
A high‐throughput screen was used to identify inhibitors of Salmonella FraB, a drug target. Characterization of top hits (identified after an additional counter screen) revealed that some triazolidines, thiadiazolidines, and triazolothiadiazoles are mixed‐type inhibitors of FraB.
Jamison D. Law   +6 more
wiley   +1 more source

Elasticity of Diametrically Compressed Microfabricated Woodpile Lattices

open access: yesAdvanced Engineering Materials, EarlyView.
Modulus–porosity relationship is derived for woodpile lattices with struts under diametrical compression. The formula presented here that Young's modulus is proportional to the square of the volume fraction E˜ρ2$E \sim \left(\rho\right)^{2}$ is shown to be consistent with computations and laboratory experiments on 3D‐printed samples.
Faezeh Shalchy, Atul Bhaskar
wiley   +1 more source

Comparison between the RSA cryptosystem and elliptic curve cryptography [PDF]

open access: yes, 2010
In the globalization era, cryptography becomes more popular and powerful; in fact it is very important in many areas (i.e. mathematics, computer science, networks, etc).
Abdullah, Kamilah
core   +1 more source

An Enhanced Approach of Elliptic Curve Cryptosystem based Unicode Representation [PDF]

open access: yes, 2016
Data encryption is an important issue and widely used in recent times to ensure security. Elliptic Curve Cryptography (ECC) is one of the most efficient techniques that are used in public key cryptography, because it is difficult for the adversary to ...
, Fatima Amounas, Lahcen El Bermi
core   +2 more sources

Mechanisms of De‐icing by Surface Rayleigh and Plate Lamb Acoustic Waves

open access: yesAdvanced Engineering Materials, EarlyView.
Ice accretion impacts daily life, renewable energy generation, maintenance, and security in industries and aeronautics. Acoustic waves (AW) are a promising method for ice removal, although de‐icing mechanisms require further investigation to optimize energy efficiency.
Shilpi Pandey   +15 more
wiley   +1 more source

Toward Architected Microstructures Using Advanced Laser Beam Shaping in Laser Powder Bed Fusion of Ti‐6Al‐4V

open access: yesAdvanced Functional Materials, EarlyView.
This research applies advanced laser beam shaping (LCoS‐SLM) to fabricate the Ti‐6Al‐4V alloy via laser powder bed fusion. A tailored beam is used to prevent martensite formation and create a dual α+β microstructure by controlling cooling rates.
Reza Esmaeilzadeh   +8 more
wiley   +1 more source

Bi‐Directional Assembly of Boron Nitride µ‐Platelets by Micro‐Molding for Advanced Thermal Interface Materials

open access: yesAdvanced Functional Materials, EarlyView.
Bi‐directionally assembled BN µ‐platelets in micropatterns formed by a micro‐molding method for thermal interface materials are demonstrated. The BN µ‐platelets are vertically aligned selectively, while compressed regions without patterns accommodate horizontally assembled BN µ‐platelets. Through anisotropic orientation, high thermal conductivities for
Young Gil Kim   +12 more
wiley   +1 more source

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2015
This paper deals with encryption of image using Elliptic curve cryptography (ECC).Elliptic curve cryptography (ECC) is an approach to public key cryptography based on algebraic structure of elliptic curves over finite fields. Basic ElGamal elliptic curve
Shukla, Ashutosh
core   +1 more source

Home - About - Disclaimer - Privacy