Results 71 to 80 of about 158,618 (286)
C16 Phase High Entropy Borides With High Magnetic Anisotropy
Rare‐earth‐free C16‐phase high entropy boride thin films exhibit enhanced magnetic anisotropy with coercivities surpassing their binary and ternary counterparts. Combinatorial synthesis of (Fe‐Co‐Ni‐Mn)2B films combined with density functional theory enables mapping of the magnetic properties across the composition space, revealing high entropy ...
Willie B. Beeson +5 more
wiley +1 more source
Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation
Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature.
Qiu, Daowen, Zhang, Wei, Zou, Xiangfu
core +1 more source
A novel FIRINOX‐loaded implant demonstrates controlled drug release, and potent therapeutic efficacy in pancreatic ductal adenocarcinoma mouse models with safety confirmed in a large‐animal pre‐clinical model. This innovative drug delivery platform offers a promising new treatment approach for non‐resectable, treatment‐resistant pancreatic cancer ...
Samantha J. Wade +19 more
wiley +1 more source
Virtual Shareholder Meetings [PDF]
Electronic communication impacts how widely-held corporations conduct shareholder meetings. For example, technology has facilitated such options as electronic proxy voting, remote electronic voting, and virtual meetings.
Boros, Elizabeth
core +1 more source
Information Transmission Strategies for Self‐Organized Robotic Aggregation
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng +5 more
wiley +1 more source
Revocable identity-based proxy re-signature scheme in the standard model
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable ...
Xiaodong YANG +4 more
doaj +2 more sources
Climate Change Attribution Using Empirical Decomposition of Climatic Data
The climate change attribution problem is addressed using empirical decomposition. Cycles in solar motion and activity of 60 and 20 years were used to develop an empirical model of Earth temperature variations.
Loehle, Craig, Scafetta, Nicola
core +1 more source
Auto‐Routing Fluidic Printed Circuit Boards
This work introduces (STREAM) software tool for routing efficiently advanced macrofluidics, an open‐source software tool for automating the design of 3D‐printable fluidic circuit boards. STREAM streamlines tube routing and layout, enabling the rapid fabrication of fluidic networks for soft robotics, lab‐on‐a‐chip devices, microfluidics, and biohybrid ...
Savita V. Kendre +3 more
wiley +1 more source
Tumbling Magnetic Microrobots for Targeted In Vivo Drug Delivery in the GI Tract
We introduce a microrobot design and integrated system for on‐demand targeted drug release in the gastrointestinal tract. The microrobot has an embedded magnet for actuation with external magnetic fields and is visualized in real time using ultrasound. It has two drug release ports sealed with a thermally sensitive wax. Local heating of the wax using a
Aaron C. Davis +7 more
wiley +1 more source
Provably secure certificate less blind proxy re-signatures
Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key ...
Tao FENG, Yi-xin LIANG
doaj +2 more sources

