Results 31 to 40 of about 17,540 (147)

Mechanoadaptation via Myosin Cytoplasmic Redistribution Protects Circulating Tumor Cells From Shear‐induced Death During Hematogenous Dissemination

open access: yesAdvanced Science, EarlyView.
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang   +10 more
wiley   +1 more source

Algebraic Attack on the Alternating Step(r,s)Generator [PDF]

open access: yes, 2010
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core  

Capacitive versus Faradaic Microelectrodes for Extracellular Stimulation: A Fully Coupled FEM–Hodgkin–Huxley Study of Thresholds and Current Redistribution

open access: yesAdvanced Electronic Materials, EarlyView.
A fully coupled FEM–HH model shows that ideally capacitive microelectrodes can achieve lower charge‐density thresholds than Faradaic contacts under current‐controlled stimulation. The advantage stems from the dynamics of surface current density on capacitive interfaces, which redirects current beneath adherent neurons.
Aleksandar Opančar   +2 more
wiley   +1 more source

Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations

open access: yesIACR Transactions on Symmetric Cryptology
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic
Lorenzo Grassi   +5 more
doaj   +1 more source

Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]

open access: yes, 2011
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core  

Interpretability and Representability of Commutative Algebra, Algebraic Topology, and Topological Spectral Theory for Real‐World Data

open access: yesAdvanced Intelligent Discovery, EarlyView.
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

Optimal model‐based design of experiments for parameter precision: Supercritical extraction case

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley   +1 more source

Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment

open access: yes, 2016
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core   +1 more source

Improving Implied Volatility Forecasts for American Options Using Neural Networks

open access: yesJournal of Futures Markets, EarlyView.
ABSTRACT This paper explores the application of neural networks to improve pricing of American options. Focusing on both American and European options on the S&P 100 index from January 2016 to August 2023, we integrate neural networks to model the difference between market‐implied and model‐implied volatilities derived from the Black‐Scholes and Heston
Haitong Jiang, Emese Lazar, Miriam Marra
wiley   +1 more source

Home - About - Disclaimer - Privacy