Results 11 to 20 of about 279 (96)
Phantasmic Encounters in the Arctic: Haunting Materialities Beyond the Ghosts of War
ABSTRACT In the vast north, ghostly experiences are common for locals and outsiders alike. Here, we explore how cultural‐natural attributes, like remoteness and extreme seasonal variation, compound experiences of the haunting in visceral ways. This provides the Arctic region with an unusually pronounced baseline of other‐than‐human agency, which in the
Aki Hakonen, Oula Seitsonen
wiley +1 more source
Recent Contributions of Organic Synthesis to Forensic Science
Forensic science is a multidisciplinary field that plays a vital role in providing scientific evidence for criminal investigations. This review highlights advances and opportunities at the interface between organic synthesis and forensic science, with applications in drug identification, forensic toxicology, and latent fingerprint detection and ...
Gustavo dos Santos Martins +3 more
wiley +1 more source
This roadmap offers a forward‐looking perspective on spin enhancement in the oxygen evolution reaction. It highlights how combining systematic experiments, advanced computational modeling, and novel magnetic, chiral, or hybrid materials can deepen the understanding of spin‐dependent catalytic mechanisms.
Emma van der Minne +29 more
wiley +1 more source
Towards Carbon Neutralization: Clean and Efficient Use of Coal
This paper provides a comprehensive exploration of the clean and efficient utilization of coal resources, with a particular emphasis on the potential of coal chemical technology, carbon materials, and CCUS technology, and the opening up of innovative pathways for the utilization of coal resources.
Xin Wen +6 more
wiley +1 more source
Engineered topologies surfaces with special wettability are promising for their ability to precisely customize wetting behaviors and incorporate versatile functionalities, setting them apart from randomly structured surfaces. However, robustness and durability have been hurdles to their broad application.
Sin‐Yung Siu +6 more
wiley +1 more source
FTheoryTools: Advancing Computational Capabilities for F‐Theory Research
Abstract A primary goal of string phenomenology is to identify realistic four‐dimensional physics within the landscape of string theory solutions. In F‐theory, such solutions are encoded in the geometry of singular elliptic fibrations, whose study often requires particularly challenging and cumbersome computations.
Martin Bies +2 more
wiley +1 more source
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
The Role of Digital Twin for Space and Remote Terrestrial Construction
This article explores digital twin technology's critical role in construction for extreme environments, including space habitats and remote terrestrial infrastructure. It highlights strategic advantages, discusses essential governance and policy frameworks, and identifies emerging technological trends, emphasising the transformative potential for ...
Ehsan Noroozinejad Farsangi
wiley +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source

