Results 41 to 50 of about 147,541 (282)

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Rheumatologic Manifestations of Patients With Type B Insulin Resistance

open access: yesArthritis Care &Research, EarlyView.
Objective The objectives of this study were to identify laboratory and clinical features associated with type B insulin resistance (TBIR), a rare condition caused by autoantibodies that inhibit the insulin receptor, most frequently occurring in the setting of systemic lupus erythematosus (SLE), and to increase awareness of this rare, life‐threatening ...
S. Amara Ogbonnaya   +4 more
wiley   +1 more source

Investigation of Laser Ablation and Brush Pre‐Treatments for AlCu Cold Roll Bonding in Oxygen‐Free Conditions

open access: yesAdvanced Engineering Materials, EarlyView.
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti   +11 more
wiley   +1 more source

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults

open access: yesSensors, 2020
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong   +5 more
doaj   +1 more source

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

Characterization of Nitinol Produced by Laser Powder Bed Fusion for Mechanical Metamaterial Applications

open access: yesAdvanced Engineering Materials, EarlyView.
Stabilization of L‐PBF Ni50.7Ti49.3 under low‐cycle loading was investigated. Recoverable strain after cycling was dependent on the amount of applied load. Recovery ratio was 53.4% and 35.1% at intermediate and high load, respectively. The maximum total strain reached 10.3% at a high load of 1200 MPa.
Ondřej Červinek   +5 more
wiley   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

Thermomechanical Fatigue and Creep–Fatigue Interaction of Inconel 718 Additively Manufactured by Laser Beam Powder Bed Fusion

open access: yesAdvanced Engineering Materials, EarlyView.
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth   +6 more
wiley   +1 more source

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy