Results 131 to 140 of about 219,660 (301)
A polymer‐intercalated modulation assembly strategy was proposed to synthesize mesoporous single‐crystalline BiVO4 with tunable pore structure by co‐assembly of inorganic–organic composite through coordination bonds and hydrogen bonds. Thanks to single‐crystalline properties and mesoporous structure with vanadium vacancy microenvironment, the prepared ...
Wei Li +6 more
wiley +1 more source
Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu +10 more
wiley +1 more source
Group decision-making (GDM) is crucial in various components of graph theory, management science, and operations research. In particular, in an intuitionistic fuzzy group decision-making problem, the experts communicate their preferences using ...
Naveen Kumar Akula +7 more
doaj +1 more source
This study demonstrates that somatic PIK3CA mutations suppress PPT1 expression via activation of the PI3K–AKT–c‐JUN axis. This reduction in PPT1 weakens its interaction with P300, thereby increasing palmitoylation at C1176 of P300 and protecting P300 from lysosomal degradation.
Hongrui Chen +7 more
wiley +1 more source
Broadband Achromatic Programmable Electromagnetic Camouflage via Fluidic‐Accessible Metasurface
A fluidic access metasurface enables dynamic, broadband electromagnetic illusions. By physically reconstructing conductive patterns with liquid metal, the metasurface achieves real‐time, pixel‐level control over phase dispersion. This allows for the programmable generation of arbitrary strong scattering point arrays, effectively deceiving high ...
Shipeng Liu +14 more
wiley +1 more source
Information Security Risk Modeling: a Comparison of Probabilistic and Fuzzy Measure Approaches
The article presents two approaches to information security risk modeling. The traditional probabilistic method is compared with the one based on fuzzy measure theory, the differences are analyzed and explained.
M. V. Timonin, V. S. Lavrentyev
doaj
The noncentrosymmetric trilayer rhombohedral‐stacked MoS2 nanoflakes with enhanced sliding ferroelectric properties are synthesized via a molecular sieve‐assisted chemical vapor deposition process. The switchable polarization states, combined with the exceptional light/gate voltage modulated electrical properties of these nanoflakes, enable broadband ...
Qichao Xue +11 more
wiley +1 more source
An Introduction to Fuzzy Measure Theory
Michio SUGENO, Toshiaki MUROFUSHI
openaire +3 more sources
Zirconium, hafnium, and mixed zirconium/hafnium doped indium tin oxide thin films are accessible by atomic layer deposition. The amorphous functional films are about 8 nm thick and show a high interdiffusion of all elements. Their transistor characteristics can be modulated depending on the amount of Zr and Hf oxide phases incorporated in these thin ...
Marie Isabelle Büschges +5 more
wiley +1 more source
APPLYING FUZZY THEORY TO SCORING PSYCHOLOGICAL MEASUREMENTS
Sen-Chi Yu, Yuan-horng Lin
openaire +3 more sources

