Results 31 to 40 of about 17,540 (147)
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang +10 more
wiley +1 more source
Algebraic Attack on the Alternating Step(r,s)Generator [PDF]
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core
A fully coupled FEM–HH model shows that ideally capacitive microelectrodes can achieve lower charge‐density thresholds than Faradaic contacts under current‐controlled stimulation. The advantage stems from the dynamics of surface current density on capacitive interfaces, which redirects current beneath adherent neurons.
Aleksandar Opančar +2 more
wiley +1 more source
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic
Lorenzo Grassi +5 more
doaj +1 more source
Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
Optimal model‐based design of experiments for parameter precision: Supercritical extraction case
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley +1 more source
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
Improving Implied Volatility Forecasts for American Options Using Neural Networks
ABSTRACT This paper explores the application of neural networks to improve pricing of American options. Focusing on both American and European options on the S&P 100 index from January 2016 to August 2023, we integrate neural networks to model the difference between market‐implied and model‐implied volatilities derived from the Black‐Scholes and Heston
Haitong Jiang, Emese Lazar, Miriam Marra
wiley +1 more source

