Results 81 to 90 of about 1,131 (250)

SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups

open access: yesIEEE Access, 2018
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the
Sneha Kanchan, Narendra S. Chaudhari
doaj   +1 more source

Linking Plant Metabolomics with Fungal Functional Dynamics Reveals a Noncanonical S‐R‐C Adaptive Trajectory

open access: yesAdvanced Science, EarlyView.
Using field‐based holo‐omics, we demonstrate that developmental shifts in sorghum leaf metabolomes drive a noncanonical fungal succession from stress tolerators (S) through ruderals (R) to competitors (C). Antifungal metabolites in young leaves select for S strategists with expanded genomes, transient maltose pulses during flowering favor fast‐growing ...
Peilin Chen, John W. Taylor, Cheng Gao
wiley   +1 more source

Sono‐Mechanogenetics: Linking Ultrasound Physics With Cellular Mechanobiology

open access: yesAdvanced Science, EarlyView.
Sono‐mechanogenetics links ultrasound physics with cellular mechanotransduction to enable noninvasive control of engineered biological systems. Acoustic forces generate distinct deformation modes that activate intracellular signaling pathways, which can be coupled to synthetic gene circuits to regulate diverse cellular functions, including gene ...
Yunjia Qu   +4 more
wiley   +1 more source

Revisiting Target‐Aware de novo Molecular Generation with TarPass: Between Rational Design and Texas Sharpshooter

open access: yesAdvanced Science, EarlyView.
TarPass provides a rigorous benchmark for target‐aware de novo molecular generation by jointly evaluating protein‐ligand interactions, molecular plausibility, and drug‐likeness on 18 well‐studied targets. Results show that current models often fail to consistently surpass random baseline in target‐specific enrichment, while post hoc multi‐tier virtual ...
Rui Qin   +11 more
wiley   +1 more source

Twisted MoS2 Bilayers as Functional Elements in Memtransistors: Hysteresis, Optical Signatures, and Photocurrent Kinetics

open access: yesAdvanced Electronic Materials, EarlyView.
ABSTRACT Layered 2D materials are considered as promising for memristive applications due to their ultimate vertical scalability compared to conventional semiconductor films and pronounced hysteresis properties. Bias‐resolved Raman and Photoluminescence mapping is used to quantify strain from phonon shifts and carrier density from the exciton‐trion ...
Vladislav Kurtash   +4 more
wiley   +1 more source

Smart Exploration of Perovskite Photovoltaics: From AI Driven Discovery to Autonomous Laboratories

open access: yesAdvanced Energy Materials, EarlyView.
In this review, we summarize the fundamentals of AI in automated materials science, and review AI applications in perovskite solar cells. Then, we sum up recent progress in AI‐guided manufacturing optimization, and highlight AI‐driven high‐throughput and autonomous laboratories.
Wenning Chen   +4 more
wiley   +1 more source

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

CrossMatAgent: AI‐Assisted Design of Manufacturable Metamaterial Patterns via Multi‐Agent Generative Framework

open access: yesAdvanced Intelligent Discovery, EarlyView.
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian   +12 more
wiley   +1 more source

Efficient chosen-ciphertext secure proxy re-encryption scheme

open access: yesTongxin xuebao, 2013
In order to construct an efficient and chosen-chiphertext secure unidirectional re-encryption scheme in the standard model,a novel and efficient unidirectional proxy re-encryption scheme was proposed, and its chosen-ciphertext security in the adaptive ...
Wei-wei ZHANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy