Results 61 to 70 of about 161,269 (289)
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic ...
Ganqin LIU +4 more
doaj +3 more sources
Toward a Consensus Characterization Protocol for Organic Thermoelectrics
We advocate a common consensus on accurate and standardized reporting of performance metrics in the field of organic thermoelectrics. We summarize prevalent issues in the literature and propose a pre‐submission checklist to support the publication of reproducible results.
Bernhard Dörling +14 more
wiley +1 more source
Optimal Control for Holonomic and Nonholonomic Mechanical Systems with Symmetry and Lagrangian Reduction [PDF]
In this paper we establish necessary conditions for optimal control using the ideas of Lagrangian reduction in the sense of reduction under a symmetry group.
Koon, Wang-Sang, Marsden, Jerrold E.
core +4 more sources
Ultrasound in Women's Health: Mechanisms, Applications, and Emerging Opportunities
As healthcare moves toward decentralization, ultrasound technologies are evolving from strictly imaging tools in clinical settings into versatile diagnostic and therapeutic platforms, with growing roles addressing women's health needs. This review highlights how ultrasound's underlying physical mechanisms can be harnessed to reduce disparities in women'
Sarah B. Ornellas +7 more
wiley +1 more source
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee +5 more
wiley +1 more source
Tourist Maps to Capture Place Identity During Disruptive Events: The Case of Beirut
Between October 2019 and August 2020, Beirut underwent an unprecedented sequence of events in its recent history, starting with massive anti-government protests, followed by an economic and financial meltdown, coupled with the Covid-19 pandemic, and ...
Laura Simak
doaj +1 more source
NFS1 Regulates IDH2 to Attenuate Abdominal Aortic Aneurysms via Interacting With SP2
The loss of NFS1 leads to its reduced binding with the transcription factor SP2, resulting in decreased expression of the downstream gene Idh2. This causes a shift in energy supply toward glycolysis in VSMCs, ultimately contributing to the occurrence and progression of AAA.
Luzheng Zhang +9 more
wiley +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source
We consider families of general four-point quadrature formulae using a generalization of the Montgomery identity via Taylor’s formula. The results are applied to obtain some sharp inequalities for functions whose derivatives belong to 𝐿𝑝 spaces ...
J. Pečarić, M. Ribičić Penava
doaj +1 more source
We prove new Ostrowski-type α-conformable dynamic inequalities and its companion inequalities on time scales by using the integration-by-parts formula on time scales associated with two parameters for functions with bounded second delta derivatives. When
Ahmed A. El-Deeb
doaj +1 more source

