Results 111 to 120 of about 383,874 (285)

Fluid Forces Control Structural Remodeling of Blind‐Ended Lymphatic Microvessels

open access: yesAdvanced Healthcare Materials, EarlyView.
Using innovative microfluidic biofabrication with fluid mechanical insights, we recapitulated the blind‐ended microanatomy and physiological drainage properties of capillary lymphatics. Our results reveal the interrelationship between intra‐ and extraluminal regions of lymphatic vessels due to flow‐induced sprouting and morphological changes that ...
Jacob C. Holter   +5 more
wiley   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Mixed‐Metal Promotion in a Manganese‐Molybdenum Oxynitride as Catalyst to Integrate C─C and C─N Coupling Reactions for the Direct Synthesis of Acetonitrile from Syngas and Ammonia

open access: yesAdvanced Materials, EarlyView.
Transition metal oxy/carbo‐nitrides show great promise as catalysts for sustainable processes. A Mn‐Mo mixed‐metal oxynitride attains remarkable performance for the direct synthesis of acetonitrile, an important commodity chemical, via sequential C─N and C─C coupling from syngas (C1) and ammonia (N1) feedstocks.
M. Elena Martínez‐Monje   +7 more
wiley   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Flexoelectrically Induced Polar Topology in Twisted SrTiO3 Membranes

open access: yesAdvanced Materials, EarlyView.
Twisted SrTiO3 bilayers host polar vortices of flexoelectric origin, revealed through combined experiment and theory. By reconstructing polarization from the toroidal moment of strain gradients, the work establishes a 3D chiral state with broken inversion and mirror symmetries.
Isabel Tenreiro   +13 more
wiley   +1 more source

Statistical cryptanalyses of symmetric-key algorithms.

open access: yes, 2010
This document is essentially presenting results on statistical cryptanalyses of iterative block ciphers. Nevertheless, some results may be applied to other situations like stream cipher cryptanalysis or side channel attacks, ... After a short recall of the basics required for the understanding of the document, we focus on the two main families of ...
openaire   +1 more source

Intelligent Acousto‐Electrical Metamaterials (IAM) for Sound Source Detection

open access: yesAdvanced Materials, EarlyView.
Our proposed metamaterial concept enables sound source detection using a single material, in contrast to conventional arrays that require dozens or even hundreds of transducers. We show that the coupled acoustic–vibrational–electrical responses in piezoelectric metamaterials give rise to topology‐governed charge transport, producing distinct voltage ...
Victor Couëdel   +7 more
wiley   +1 more source

Polymorph‐Specific Electronic Transduction in WO3 during Molecular Sensing

open access: yesAdvanced Materials, EarlyView.
Metal‐oxide polymorphs with similar surface chemistry can nevertheless exhibit distinct sensing properties. In γ‐ and ε‐WO3, analyte adsorption appears comparable; yet, only ε‐WO3 induces a pronounced lattice electronic perturbation that accommodates charge in sub‐conduction band minimum states.
Matteo D'Andria   +6 more
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

An Automated Synthesis Framework for Benchmarking Quantum Resource Costs of Symmetric-Key Cryptography

open access: yesMathematics
Modern information security relies heavily on symmetric-key cryptography such as AES. As quantum computing advances, these classical schemes face increasing pressure from quantum key-search attacks, most notably Grover’s algorithm.
Chanho Choi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy