Results 71 to 80 of about 49,336 (256)
Perspective: OLED Displays Singing with the Blues
While blue pixels consume approximately 50% of the energy of OLED display front planes, in the 25 years since their invention, 100% internal efficiency triplet‐controlled phosphorescent OLEDs have not met the stability standards necessary for their adoption.
Stephen R. Forrest +2 more
wiley +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis +2 more
core +2 more sources
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee +5 more
wiley +1 more source
Advances in Safe, Flexible, and Stretchable Batteries for Wearable Applications
Unlike previous reviews centered on component‐based deformability, this work highlights safety‐driven design strategies for flexible and stretchable batteries. By integrating material‐level engineering, geometry‐controlled structures, biocompatibility, and self‐protection mechanisms, it establishes a unified framework that connects mechanical ...
Hyewon Kang +4 more
wiley +1 more source
Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu +16 more
wiley +1 more source
Using human induced pluripotent stem cells (hiPSCs)‐derived neuronal model, Tian and colleagues reveal that voltage‐gated calcium channels Cav1.2 and Cav1.3, and their mediated calcium ion influx, are essential for early morphogenesis of human neuronal development, while ECEL1 underlies human neuronal functional developmental maturation through CALM3 ...
Yue Tian +5 more
wiley +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources
The Effectiveness Of Bytecode Decompilation [PDF]
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source

