Results 201 to 210 of about 84,134 (310)
Joint Operation in Public Key Cryptography [PDF]
Dragan Vidaković +3 more
openalex +1 more source
This study describes the fabrication of arrays of luminal tissue constructs for 3D luminal tissue modeling. An oil or media‐filled reservoir between constructs serves as a liquid barrier or bridge to regulate communication between lumens within the array for modeling multi‐tissue interactions in vitro. Abstract Cell‐lined luminal structures are crucial
Mouhita Humayun +9 more
wiley +1 more source
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Recent Advances on Thermochromic Inks for Security Applications
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira +5 more
wiley +1 more source
Multiclass Identification of Van der Waals Semiconductors via Attention Neural Networks
Intelligent characterization of van der Waals semiconductors is an essential process for industrial manufacturing and laboratory fabrication. A fused network of ResNet‐Inception with attention layer is developed for accurate multiclass classification of randomly distributed layers of chemical vapor deposition‐grown van der Waals semiconductors ...
Xingchen Dong +5 more
wiley +1 more source
Privacy-preserving AUC computation in distributed machine learning with PHT-meDIC. [PDF]
de Arruda Botelho M +4 more
europepmc +1 more source
Robots can learn manipulation tasks from human demonstrations. This work proposes a versatile method to identify the physical interactions that occur in a demonstration, such as sequences of different contacts and interactions with mechanical constraints.
Alex Harm Gert‐Jan Overbeek +3 more
wiley +1 more source
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support. [PDF]
Zhiqiang H +5 more
europepmc +1 more source
Continual Learning for Multimodal Data Fusion of a Soft Gripper
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley +1 more source

