Results 61 to 70 of about 4,746 (306)

Advanced Emissivity Tuning Via Femtosecond Laser Surface Engineering

open access: yesAdvanced Optical Materials, EarlyView.
Femtosecond laser surface processing (FLSP) is employed to fabricate titanium‐based metamaterials with engineered micro/nano‐scale features that exhibit spectrally selective and omnidirectional thermal emissivity. By integrating advanced ellipsometry, electromagnetic modeling, and compositional analysis, the work reveals resonance‐driven emissivity ...
Zahra Kamali Khanghah   +8 more
wiley   +1 more source

A Survey on Elliptic Curve Cryptography

open access: yesINTERNATIONAL JOURNAL OF RESEARCH IN ADVANCE ENGINEERING, 2015
Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based onelliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. ECCgenerates keys through the properties of the elliptic curve equation instead of the conventional method ofkey generation.
Kinjal Mehta, Dharmesh Patel
openaire   +2 more sources

Flat Optics for Polarization Structure Engineering from 2D to 3D

open access: yesAdvanced Optical Materials, EarlyView.
Metasurfaces have transformed polarization control by enabling precise engineering of complex polarization structures. This review explores their evolution from generating 2D polarization structures to shaping fully 3D polarization fields. By unlocking the unprecedented control over the polarization and spectral information of light, these advances ...
Buxiong Qi, Yan Li, Xianzhong Chen
wiley   +1 more source

Compiler Assisted Elliptic Curve Cryptography [PDF]

open access: yes, 2007
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is ...
Barbosa, Manuel B M   +2 more
openaire   +3 more sources

Cloaking and Antennas: From Theoretical Paradigms to Next‐Generation Intelligent Systems

open access: yesAdvanced Optical Materials, EarlyView.
The inception of electromagnetic cloaking sparked an immediate question: Can antennas be made invisible? Two decades later, this review charts the intertwined progress of major cloaking strategies (from transformation optics to scattering cancellation), metasurface technology, and their application to antennas, revealing how AI‐enabled devices are ...
Helen Guo, Xun Li
wiley   +1 more source

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network

open access: yesDianxin kexue, 2016
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was ...
Yuehui CHEN, Miao HUANG
doaj   +2 more sources

Floquet‐Engineered Noise‐Resilient Terahertz Receiver with Modular Phased Array Architecture for Scalable Chip‐Scale Communication

open access: yesAdvanced Photonics Research, EarlyView.
Overcoming the bandwidth, latency, and power constraints of wired interconnects in multicore processing units, this work introduces a terahertz wireless solution featuring a dual‐carrier modular phased‐array transmitter and a novel 2D semiconductor quantum‐well nanoreceiver.
Kosala Herath   +5 more
wiley   +1 more source

Super‐Convergent Meshless Computations for Active Vibration Control of Bi‐Directional Functionally Graded Terfenol‐D Beams with Twisted Geometry

open access: yesAdvanced Theory and Simulations, EarlyView.
This study develops a superconvergent meshless method to analyze and control vibrations in twisted, bidirectional functionally graded Terfenol‐D beams. By optimizing magnetostrictive patch placement, it demonstrates effective vibration suppression under dynamic loads, highlighting the design potential of strategically graded materials in complex ...
Mukund A. Patil   +2 more
wiley   +1 more source

Elliptic curve cryptography and biometrics for iot authentication [PDF]

open access: yesSerbian Journal of Electrical Engineering
The Internet of Things (IoT) is now present in every aspect of our daily lives because of its ability to offer remote services. Unfortunately, the insecure transmission of user data in open channels caused by this significant use of IoT networks
Dargaoui Souhayla   +6 more
doaj   +1 more source

SURF: A Self‐Supervised Deep Learning Method for Reference‐Free Deconvolution in Spatial Transcriptomics

open access: yesAdvanced Science, EarlyView.
SURF is a robust reference‐free deconvolution tool that integrates high‐dimensional spatial transcriptomics gene expression analysis with self‐supervised deep learning, enabling effective modeling of non‐linear gene interactions and spot relationships.
Shuyu Liang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy