Results 31 to 40 of about 34,466 (227)
Exercises to determine the types of errors made in the solving of verbal problems in Algebra I. [PDF]
Thesis (Ed.M.)--Boston ...
Tenney, Arthur C.
core +1 more source
Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal +5 more
core +1 more source
The work demonstrates that strategic wall‐thickness grading in diamond triply periodic minimal surface lattices enables precise tuning of deformation and failure behavior under compression. Different gradation patterns guide how and where the structure collapses, improving energy absorption or promoting controlled brittle failure.
Giovanni Rizza +3 more
wiley +1 more source
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel +3 more
core +1 more source
A Related-Key Rectangle Attack on the Full KASUMI [PDF]
KASUMI is an 8-round Feistel block cipher used in the confidentiality and the integrity algorithms of the 3GPP mobile communications. As more and more 3GPP networks are being deployed, more and more users use KASUMI to protect their privacy. Previously known attacks on KASUMI can break up to 6 out of the 8 rounds faster than exhaustive key search, and ...
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
Zinc(II) coordination complexes with tunable aryloxy‐imine ligands exhibit controllable supramolecular self‐assembly into hierarchical fibrous structures. Coordination‐driven stacking, not π–π interactions, enables gelation, dynamic assembly/disassembly, and enhanced nanomechanical properties.
Merlin R. Stühler +10 more
wiley +1 more source
This study demonstrates that pulsed potential electrolysis significantly improves CO2 reduction performance on copper‐nitrogen doped carbon electrodes. The formation of cationic copper sites and metallic clusters as a function of applied intermittent potential leads to notable selectivity changes compared to potentiostatic reduction.
Dorottya Hursán +13 more
wiley +1 more source
This study examines how pore shape and manufacturing‐induced deviations affect the mechanical properties of 3D‐printed lattice materials with constant porosity. Combining µ‐CT analysis, FEM, and compression testing, the authors show that structural imperfections reduce stiffness and strength, while bulk material inhomogeneities probably enhance ...
Oliver Walker +5 more
wiley +1 more source

