Results 71 to 80 of about 32,432 (238)
Exposure to second-hand aerosol produced by electronic cigarettes: a systematic review
Background Since 2007, the use of electronic cigarettes has grown rapidly around the world. This trend raises concerns about the potential exposure of bystanders to aerosols from electronic cigarettes, particularly considering that its use in public ...
Esteve Fernández +4 more
doaj +1 more source
Non-linear Reduced Round Attacks against SHA-2 Hash Family [PDF]
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE '08, an attack against reduced round SHA-256 was presented by Nikolic and Biryukov which used a local collision which is valid for the actual SHA-256 function.
Somitra Kumar Sanadhya, Palash Sarkar
openaire +1 more source
Sentience in cephalopod molluscs: an updated assessment
ABSTRACT This article evaluates the evidence for sentience – the capacity to have feelings – in cephalopod molluscs: octopus, cuttlefish, squid, and nautilus. Our framework includes eight criteria, covering both whether the animal's nervous system could support sentience and whether their behaviour indicates sentience.
Alexandra K. Schnell +4 more
wiley +1 more source
ABSTRACT Bullying perpetration and substance use are two prevalent and concerning forms of delinquent behavior worldwide. Although parent–child communication has been theorized to reduce adolescents' involvement in these behaviors, empirical evidence remains mixed.
Hang Zhou, Ji‐Kang Chen
wiley +1 more source
Under an alternating electric field, the lithiated halloysite nanotubes (HNTs–SO₃Li) self‐assemble into a perpendicular orientation, creating continuous pathways with low tortuosity that markedly enhance room‐temperature ionic conductivity. The shortened diffusion path within this alignment enables rapid Li⁺ transport, while the establishment of a ...
Sha Peng +7 more
wiley +1 more source
A strategy for the Pt/TiO2‐photocatalyzed β‐scission of nonactivated 3° alcohols in the absence of external oxidants and additives was developed. A wide variety of C‐centered radicals were generated and subsequently engaged in C─C bond‐forming reactions.
Shu Sakurai +3 more
wiley +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Functional hybrid microbeads with electrical, magnetic, and/or optical responsiveness have emerged as versatile platforms for biotechnology. This review highlights recent advances in microfluidic technologies for producing such microbeads, with a focus on incorporating functional nanoparticles in microdroplet systems.
Bayinqiaoge +2 more
wiley +1 more source
This study investigates the blast‐induced rock damage patterns under different cut‐hole layouts and ground stress conditions through numerical simulations and field tests. The findings in this study provide valuable insights for similar underground engineering applications.
Junjie Zhao +5 more
wiley +1 more source
The tensile strength of granite, a proposed host for nuclear waste, degrades severely above 400°C. We link this to specific microcracking patterns captured by acoustic emission, establishing a scientific basis for assessing repository safety under thermal load.
Wei Zeng +7 more
wiley +1 more source

