Results 171 to 180 of about 3,671,128 (304)
Privacy-hardened and hallucination-resistant synthetic data generation with logic-solvers. [PDF]
Burgess MA +7 more
europepmc +1 more source
Low‐Angle Grain Boundaries and Re‐Segregation in Single‐Crystalline Ni‐Base Superalloys
This work demonstrates that Re‐segregation at low‐angle grain boundaries (LAGBs) in Ni‐base superalloys is influenced by misorientation angle. Advanced microscopy and atom probe tomography reveal that higher misorientation angles increases Re‐segregation.
Alireza B. Parsa +9 more
wiley +1 more source
Solving perfect matchings by frequency-grouped multi-photon events using a silicon chip. [PDF]
Zhu P +8 more
europepmc +1 more source
This study demonstrates how optimizing laser power, scanning speed, and hatching distance in laser powder bed fusion can boost the productivity of Inconel 718 manufacturing by up to 29% while maintaining mechanical integrity. The work delivers a validated process window and cost–time analysis, offering industry‐ready guidelines for efficient additive ...
Amir Behjat +7 more
wiley +1 more source
versat: A Verified Modern SAT Solver
Duckki Oe +3 more
semanticscholar +1 more source
Micro‐Raman spectroscopy is applied to characterize corrosion products in a recycled‐based MgO–316L steel composite anode after molten salt electrolysis. A depth‐dependent Fe–O/Fe–Al–O layer sequence of magnetite, hercynite, and an Al‐doped magnetite transition zone is identified.
Felix Drechsler +9 more
wiley +1 more source
A Diagnostic Procedure for Identifying Isotherm Models in Liquid Chromatography. [PDF]
Katsoulas K +3 more
europepmc +1 more source
Towards Defect Phase Diagrams: From Research Data Management to Automated Workflows
A research data management infrastructure is presented for the systematic integration of heterogeneous experimental and simulation data required for defect phase diagrams. The approach combines openBIS with a companion application for large‐object storage, automated metadata extraction, provenance tracking and federated data access, thereby supporting ...
Khalil Rejiba +5 more
wiley +1 more source
Further observations on the security of Speck32-like ciphers using machine learning. [PDF]
Hou Z, Ren J, Chen S.
europepmc +1 more source

