Results 111 to 120 of about 383,874 (285)
Fluid Forces Control Structural Remodeling of Blind‐Ended Lymphatic Microvessels
Using innovative microfluidic biofabrication with fluid mechanical insights, we recapitulated the blind‐ended microanatomy and physiological drainage properties of capillary lymphatics. Our results reveal the interrelationship between intra‐ and extraluminal regions of lymphatic vessels due to flow‐induced sprouting and morphological changes that ...
Jacob C. Holter +5 more
wiley +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Transition metal oxy/carbo‐nitrides show great promise as catalysts for sustainable processes. A Mn‐Mo mixed‐metal oxynitride attains remarkable performance for the direct synthesis of acetonitrile, an important commodity chemical, via sequential C─N and C─C coupling from syngas (C1) and ammonia (N1) feedstocks.
M. Elena Martínez‐Monje +7 more
wiley +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Flexoelectrically Induced Polar Topology in Twisted SrTiO3 Membranes
Twisted SrTiO3 bilayers host polar vortices of flexoelectric origin, revealed through combined experiment and theory. By reconstructing polarization from the toroidal moment of strain gradients, the work establishes a 3D chiral state with broken inversion and mirror symmetries.
Isabel Tenreiro +13 more
wiley +1 more source
Statistical cryptanalyses of symmetric-key algorithms.
This document is essentially presenting results on statistical cryptanalyses of iterative block ciphers. Nevertheless, some results may be applied to other situations like stream cipher cryptanalysis or side channel attacks, ... After a short recall of the basics required for the understanding of the document, we focus on the two main families of ...
openaire +1 more source
Intelligent Acousto‐Electrical Metamaterials (IAM) for Sound Source Detection
Our proposed metamaterial concept enables sound source detection using a single material, in contrast to conventional arrays that require dozens or even hundreds of transducers. We show that the coupled acoustic–vibrational–electrical responses in piezoelectric metamaterials give rise to topology‐governed charge transport, producing distinct voltage ...
Victor Couëdel +7 more
wiley +1 more source
Polymorph‐Specific Electronic Transduction in WO3 during Molecular Sensing
Metal‐oxide polymorphs with similar surface chemistry can nevertheless exhibit distinct sensing properties. In γ‐ and ε‐WO3, analyte adsorption appears comparable; yet, only ε‐WO3 induces a pronounced lattice electronic perturbation that accommodates charge in sub‐conduction band minimum states.
Matteo D'Andria +6 more
wiley +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Modern information security relies heavily on symmetric-key cryptography such as AES. As quantum computing advances, these classical schemes face increasing pressure from quantum key-search attacks, most notably Grover’s algorithm.
Chanho Choi +4 more
doaj +1 more source

