Results 91 to 100 of about 244,652 (251)
A solvent‐minimized mechanochemical strategy enables the synthesis of C₆₀‐encapsulated amino‐functionalized ZIF‐12 as a visible‐light‐driven bifunctional photocatalyst. Synergistic charge separation enhances hydroxyl radical generation, achieving efficient viral in saline water and bacterial inactivation in river water under environmentally relevant ...
Noelia Rodríguez‐Sánchez +7 more
wiley +1 more source
Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA
Just like conventional signatures, digital signatures can be used to prove the authenticity of a document in digital form. In addition, digital signatures can also be used to prove the validity of the author of the document, so that the author of the ...
Rezania Agramanisti Azdy
doaj +1 more source
Integer factoring and compositeness witnesses
We describe a reduction of the problem of factorization of integers n ≤ x in polynomial-time (log x)M+O(1) to computing Euler’s totient function, with exceptions of at most xO(1/M) composite integers that cannot be factored at all, and at most x exp −cM ...
Pomykała Jacek, Radziejewski Maciej
doaj +1 more source
Random Sequential Adsorption on Fractals
Irreversible adsorption of spheres on flat collectors having dimension ...
Conway J. H. +5 more
core +1 more source
Drones are used to monitor bird nesting sites at less accessible locations, such as on cliffs, human infrastructure, or within the tree canopy. While there are a growing number of studies documenting avian behavioral responses to various drones, there is a continued need to monitor taxa‐specific responses to different drone models. We explored both the
Natasha K. Murphy +4 more
wiley +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Abstract The rapid expansion of biodiversity data presents new opportunities to understand and forecast biosphere dynamics. However, disparate and dispersed data, taxonomic and geographic inconsistencies, pervasive quality issues, and a lack of reproducable workflows hinder synthesis, introduce biases and limit accurate assessment of biodiversity ...
Brian J. Enquist +38 more
wiley +1 more source
Sugarcane phosphorus (P) availability is limited in tropical soils, requiring strategies to improve fertilizer efficiency. This study evaluated Bacillus velezensis UFV 3918 (Bv) in combination with an organomineral fertilizer (OF) at reduced monoammonium phosphate (MAP) doses. It showed that Bv + OF + 1/3 MAP achieved soil and plant P levels comparable
Gustavo Ferreira da Silva +3 more
wiley +1 more source

