Results 51 to 60 of about 19,739 (264)

A Covert Data Transport Protocol

open access: yes, 2017
Both enterprise and national firewalls filter network connections. For data forensics and botnet removal applications, it is important to establish the information source.
Brooks, Richard   +4 more
core   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

Asymmetry of the Ferroelectric Phase Transition in BaTiO3

open access: yesAdvanced Materials, EarlyView.
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz   +14 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Programmable Dimensional Lithography with Digital Micromirror Devices for Multifunctional Microarchitectures

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee   +5 more
wiley   +1 more source

A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

open access: yesIEEE Access, 2018
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj   +1 more source

Soybean Auxin Transporter PIN3 Regulates Nitrate Acquisition to Improve Nitrogen Use and Seed Traits

open access: yesAdvanced Science, EarlyView.
Xu et al. discovers that switching off auxin transporters in soybean, PIN3a and PIN3b, disrupts auxin flow; this triggers ARF‐STF3/4 signal cascade to activate the nitrate importer NPF2.13 and soil nitrogen acquisition. Multi‐year field trials show edited soybeans maintain yield with higher oil content, offering a potential genetic route to improve ...
Huifang Xu   +16 more
wiley   +1 more source

Vulnerability Analysis and Detection of Android System Signature [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that an attacker can issue pirated software by re-signing the vulnerabilities in the self-signature process of Android system application program,this paper analyses the digital signature and verification process of Android system ...
LIAO Fangyuan, GAN Zhiwang
doaj   +1 more source

Unraveling the Morphological and Functional Maturation Mechanisms Underlying Human Neural Development Using iPSCs‐Derived Neuronal Model

open access: yesAdvanced Science, EarlyView.
Using human induced pluripotent stem cells (hiPSCs)‐derived neuronal model, Tian and colleagues reveal that voltage‐gated calcium channels Cav1.2 and Cav1.3, and their mediated calcium ion influx, are essential for early morphogenesis of human neuronal development, while ECEL1 underlies human neuronal functional developmental maturation through CALM3 ...
Yue Tian   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy