Results 91 to 100 of about 35,561 (292)
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín +2 more
wiley +1 more source
Introduction: Consistent delineation of the breast conserving surgery (BCS) tumour bed (TB) for breast cancer remains a challenge for radiation oncologists.
Janice Yeh +12 more
doaj +1 more source
Are all meats substitutes? A basket‐and‐expenditure‐based approach
Abstract This study examines the relationship among animal‐based meat and plant‐based meat alternatives (PBMAs) using a basket‐and‐expenditure‐based choice experiment. In particular, we examine whether animal‐based meat products are substitutes or complements with PBMAs.
Clinton L. Neill, Logan L. Britton
wiley +1 more source
A steric hindrance induction strategy is developed to regulate the conformation of motif on the surface of Au24 nanocluster. Accordingly, a reversible structural isomerization process between two Au24 isomers is activated. Take advantage of the temperature responsiveness of this tautomerization process, the Au24 nanocluster is utilized for optical ...
Qinzhen Li +5 more
wiley +1 more source
This review outlines how recurrent neural networks model multisensory integration by capturing temporal and probabilistic features of sensory input. Key developments, challenges, and future directions are summarized, providing insights into biologically inspired AI. Multisensory integration (MSI) is a core brain function underlying perception, learning,
Ehsan Bolhasani +2 more
wiley +1 more source
A low‐cost, Lego‐like magneto‐connected part library is proposed, capable of rapidly assembling, disassembling, and reassembling compact, centimeter‐scale parallel robots with various motion types, balancing structural rigidity and reconfiguration agility.
Yunong Li +5 more
wiley +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Comments to the Federal Trade Commission on the CAN-SPAM Rule Review, 16 C.F.R. Part 316, Project No. R711010 [PDF]
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316. The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect ...
Ford, Roger Allan
core +1 more source
This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.
A. Kato, M. Kanda, S. Kanno
core
The Digital Signature Scheme MQQ-SIG [PDF]
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles +6 more
core +1 more source

