Results 51 to 60 of about 30,050 (262)
Mapping Nanoscale Buckling in Atomically Thin Cr2Ge2Te6
Atomic‐resolution STEM is used to resolve nanoscale buckling in monolayer Cr2Ge2Te₆. A noise‐robust image analysis reconstructs three‐dimensional lattice distortions from single plan‐view images, revealing pronounced defect‐driven nm‐scale out‐of‐plane buckling.
Amy Carl +20 more
wiley +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk +2 more
doaj +1 more source
Proxy-Terms Based Query Obfuscation Technique for Private Web Search
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir +2 more
doaj +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Next‐Generation Psoriasis Therapy – With advanced dendrimer‐based formulations, this study paves the way for highly effective, skin‐permeable treatments. Encapsulated in fluid catanionic vesicles, IMD‐006 and its analogues show promising anti‐psoriatic effects offering a targeted, non‐invasive approach to managing chronic skin inflammation.
Ranime Jebbawi +10 more
wiley +1 more source
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała +3 more
doaj +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression
This paper presents a novel hybrid methodology with structural obfuscation and encrypted chromosomal DNA impression to secure intellectual property (IP) cores of digital signal processing (DSP) applications.
Anirban Sengupta, Rahul Chaurasia
doaj +1 more source
Differential Data Analysis for Recommender Systems
We present techniques to characterize which data is important to a recommender system and which is not. Important data is data that contributes most to the accuracy of the recommendation algorithm, while less important data contributes less to the ...
Chow, Richard +3 more
core +1 more source
Glass, historically valued for its purity and durability, has long inspired artists and societies. This article introduces the concept of “Archeo‐Inspiration”, drawing on cultural and historical contexts of glass to guide future material innovations.
Eva von Contzen +3 more
wiley +1 more source

