Results 91 to 100 of about 1,470,777 (390)

Polarization retention loss in PbTiO3 ferroelectric films due to leakage currents [PDF]

open access: yes, 2007
The relationship between retention loss in single crystal PbTiO3 ferroelectric thin films and leakage currents is demonstrated by piezoresponse and conductive atomic force microscopy measurements.
A. Morelli   +5 more
core   +3 more sources

Microfluidic electro‐viscoelastic manipulation of extracellular vesicles

open access: yesFEBS Open Bio, EarlyView.
The electro‐viscoelastic manipulation as a potential method for separation of particles based on size. The particles introduced as a sheath flow migrate to the channel center under the influence of simultaneously applied electric field and pressure driven flow.
Seyedamirhosein Abdorahimzadeh   +7 more
wiley   +1 more source

Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy [PDF]

open access: yes, 2015
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect.
Benjamin Fuller, Ariel Hamlin
openaire   +1 more source

Effects of Leakage Neutral Particles on Shocks

open access: yes, 2012
In this paper we investigate effects of neutral particles on shocks propagating into the partially ionized medium. We find that for 120 km/s < u_{sh} < 3000 km/s (u_{sh} is the shock velocity), about ten percent of upstream neutral particles leak into ...
Abdo   +29 more
core   +1 more source

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

Magnetic field dependence of Pauli spin blockade: a window into the sources of spin relaxation in silicon quantum dots

open access: yes, 2011
We investigate spin relaxation in a silicon double quantum dot via leakage current through Pauli blockade as a function of interdot detuning and magnetic field.
Churchill, H. O. H.   +5 more
core   +1 more source

Relating Agulhas leakage to the Agulhas Current retroflection location [PDF]

open access: yes, 2009
The relation between the Agulhas Current retroflection location and the magnitude of Agulhas leakage, the transport of water from the Indian to the Atlantic Ocean, is investigated in a high-resolution numerical ocean model.
Barron, C.N.   +5 more
core   +2 more sources

Diffusion Tractography Biomarker for Epilepsy Severity in Children With Drug‐Resistant Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To develop a novel deep‐learning model of clinical DWI tractography that can accurately predict the general assessment of epilepsy severity (GASE) in pediatric drug‐resistant epilepsy (DRE) and test if it can screen diverse neurocognitive impairments identified through neuropsychological assessments.
Jeong‐Won Jeong   +7 more
wiley   +1 more source

The Progress of Autoignition of High-Pressure Hydrogen Gas Leakage: A Comprehensive Review

open access: yesFire
As a paradigm of clean energy, hydrogen is gradually attracting global attention. However, its unique characteristics of leakage and autoignition pose significant challenges to the development of high-pressure hydrogen storage technologies.
Gan Cui   +6 more
doaj   +1 more source

Revisiting Leakage Abuse Attacks

open access: yesIACR Cryptology ePrint Archive, 2019
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over encrypted data. ESAs can be designed with various primitives including searchable/structured symmetric encryption (SSE/STE) and oblivious RAM (ORAM).
Laura Blackstone   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy