Results 111 to 120 of about 81,733 (278)
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures
Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access to your email to prove the authenticity of the stolen
Green, Matthew +2 more
core
Associations of Rheumatoid Arthritis Disease Activity With Frailty Over Five Years of Follow‐up
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis (VARA) registry enrolled from 2003 to 2022 were included.
Courtney N. Loecker +14 more
wiley +1 more source
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
What Do Large Language Models Know About Materials?
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer +2 more
wiley +1 more source
New features on yttria‐stabilized zirconia after exposure at 1500°C: Newly discovered pyramidal structures on an old material. After exposure at 1550°C on the cross section of YSZ new features, namely pyramidal structures are discovered. These structures grow with time, increase in numbers, appear as singularities, are often arranged in strings, and ...
Doris Sebold +2 more
wiley +1 more source
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary +5 more
doaj +1 more source
Do not let thermal drift and instrument artifacts deceive high‐temperature nanoindentation results. We compare classical Oliver–Pharr and automatic image recognition analyses across steels and a Ni alloy to quantify these effects. Accounting for artifacts reveals systematic softening with temperature, while Cr and Ni additions boost resistance ...
Velislava Yonkova +2 more
wiley +1 more source
A novel workflow for investigating hydride vapor phase epitaxy for GaN bulk crystal growth is proposed. It combines Design of experiments (DoE) with physical simulations of mass transport and crystal growth kinetics, serving as an intermediate step between DoE and experiments.
J. Tomkovič +7 more
wiley +1 more source
The separation of Helium gas from natural gas is challenging but highly important. MIL‐116(Ga), a “non‐porous” metal–organic framework is used as a molecular sieve to separate He from CH4. Druse‐like MIL‐116(Ga) particles are integrated into polysulfone mixed matrix membranes.
Ayisha Komal +10 more
wiley +1 more source
Quantum-Resistant Forward-Secure Digital Signature Scheme Based on q-ary Lattices
In this paper, we design and consider a new digital signature scheme with an evolving secret key, using random q-ary lattices as its domain. It is proved that, in addition to offering classic eu-cma security, the scheme is existentially forward ...
Mariusz Jurkiewicz
doaj +1 more source

