Results 51 to 60 of about 147,541 (282)
The remarkable accomplishments of deep neural networks (DNN) have led to their widespread adoption in various contexts, including safety-critical applications.
Aruna Pavate +5 more
doaj +1 more source
Ascent trajectory optimisation for a single-stage-to-orbit vehicle with hybrid propulsion [PDF]
This paper addresses the design of ascent trajectories for a hybrid-engine, high performance, unmanned, single-stage-to-orbit vehicle for payload deployment into low Earth orbit. A hybrid optimisation technique that couples a population-based, stochastic
Brown, Richard +4 more
core +1 more source
New Impossible Differential Attack on SAFER + and SAFER + + [PDF]
SAFER+ was a candidate block cipher for AES with 128-bit block size and a variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with key sizes of 128, 192 and 256 are 8, 12 and 16, respectively. SAFER++, a variant of SAFER+, was among the cryptographic primitives selected
Jingyuan Zhao +3 more
openaire +1 more source
Cermets (60 vol.% AISI 316L stainless steel, 40 vol.% recycled MgO), intended for use in aluminum electrolysis, were pre‐oxidized in three furnaces with different heating technologies and subjected to a cryolite corrosion test. The different atmospheres influenced the formation of oxide layers, which in turn affected corrosion resistance and ...
Patricia Kaiser +4 more
wiley +1 more source
This plot compares experimental tensile stress–strain curves (with 4 different strain rates) and corresponding modelled curves (obtained using the optimised sets of Voce and Miller–Norton parameter values shown). The inferred M‐N values, characterizing the creep, are very similar to those obtained via conventional creep testing.
S. Ooi, R. P. Thompson, T. W. Clyne
wiley +1 more source
Further Results of the Cryptographic Properties on the Butterfly Structures
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core +1 more source
Preventing False Discovery in Interactive Data Analysis is Hard [PDF]
We show that, under a standard hardness assumption, there is no computationally efficient algorithm that given $n$ samples from an unknown distribution can give valid answers to $n^{3+o(1)}$ adaptively chosen statistical queries. A statistical query asks
Hardt, Moritz, Ullman, Jonathan
core +1 more source
Electroactive Metal–Organic Frameworks for Electrocatalysis
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska +7 more
wiley +1 more source
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz +3 more
wiley +1 more source
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj +1 more source

