Results 131 to 140 of about 90,635 (323)

Status report on the first round of the NIST post-quantum cryptography standardization process

open access: yes, 2019
,
G. Alagic   +11 more
semanticscholar   +1 more source

Some application of difference equations in Cryptography and Coding Theory [PDF]

open access: yesarXiv, 2018
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
arxiv  

Motion Capture and Augmented‐Reality‐Assisted Surface Reconstruction and Robotic Remanufacturing System

open access: yesAdvanced Intelligent Systems, EarlyView.
An virtual reality augmented‐reality‐ and motion‐capture‐assisted surface remanufacturing system is presented. Operators can interactively reconstruct the virtual model using the designed motion‐captured pointer directly on the physical workpiece surface. Operators can intuitively and interactively manipulate the system to accomplish tasks ranging from
Guoliang Liu, Wenlei Sun, Pinwen Li
wiley   +1 more source

Manipulation of Chemistry and Biology with Visible Light Using Tetra‐ortho‐Substituted Azobenzenes and Azonium Ions

open access: yesAngewandte Chemie, EarlyView.
Tetra‐ortho‐Azobenzenes (TOABs) in broad daylight: in recent years, TOAB photoswitches became indispensable tools for all‐visible‐light manipulation of chemistry, biology and materials. This review explores their unique photochemical properties, design and synthetic approaches, offering support in choosing a TOAB for a given application.
Francesca Cardano   +2 more
wiley   +2 more sources

Problems in group theory motivated by cryptography [PDF]

open access: yesarXiv, 2018
This is a survey of algorithmic problems in group theory, old and new, motivated by applications to cryptography.
arxiv  

Computer Vision for Substrate Detection in High‐Throughput Biomaterial Screens Using Bright‐Field Microscopy

open access: yesAdvanced Intelligent Systems, EarlyView.
It is known that biomaterial properties (e.g., shape, chemistry) direct how the body reacts to implanted materials. However, what features cause specific responses is not well known. High‐throughput screening can identify instructive properties, but manual feature segmentation in large brightfield image datasets limits discovery.
Robert Owen   +10 more
wiley   +1 more source

Mapping Interictal activity in epilepsy using a hidden Markov model: A magnetoencephalography study

open access: yesHuman Brain Mapping, Volume 44, Issue 1, Page 66-81, January 2023., 2023
In this study, we use hidden Markov modeling (HMM) to create a unique statistical model of interictal brain activity for 10 pediatric epilepsy patients. This data‐driven model produces an output unique to each patient, and is used to localize the epileptogenic area(s).
Zelekha A. Seedat   +13 more
wiley   +1 more source

Development of an Automated Workflow for Screening the Assembly and Host–Guest Behavior of Metal‐Organic Cages Towards Accelerated Discovery

open access: yesAngewandte Chemie, EarlyView.
An automated experimental workflow to accelerate the discovery of metal‐organic cages (MOCs), which is often hindered by slow, manual approaches, has been developed. Automation of the synthesis, characterization, and analysis, is supported by computational modelling to rationalize the experimental outcomes, and development of a host–guest assay ...
Annabel R. Basford   +8 more
wiley   +2 more sources

Home - About - Disclaimer - Privacy