Results 91 to 100 of about 49,036 (287)
Meta‐Rod Mechanical Metamaterials With Programmable Reconfiguration
Existing mechanical metamaterials achieve programmable large deformations in planar square or cubic configurations, restricted by required complex boundary conditions. This research proposes a 1D metamaterial, Meta‐rod, with linear, bending, twisting, area, and volume deformation modes.
Atharva Pande, Lyes Kadem, Hang Xu
wiley +1 more source
Deepfake technology can produce highly realistic manipulated media which pose as significant cybersecurity threats, including fraud, misinformation, and privacy violations.
Mohammad Alkhatib
doaj +1 more source
2D Magnetic and Topological Quantum Materials and Devices for Ultralow Power Spintronics
2D magnets and topological quantum materials enable ultralow‐power spintronics by combining robust magnetic order with symmetry‐protected, Berry‐curvature‐driven transport. Fundamentals of 2D anisotropy and spin‐orbit‐coupling induced band inversion are linked to scalable growth and vdW stacking.
Brahmdutta Dixit +5 more
wiley +1 more source
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups [PDF]
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes with a non trivial automorphism group. Such codes display
de Portzamparc, Frédéric +4 more
core +2 more sources
VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY
Today Communication is mainly depends upon digital data communication. Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used.
openaire +2 more sources
Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee +7 more
wiley +1 more source
ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ
The author considers various aspects of obfuscation technique towards white-box cryptography and its application for DRM solutions. This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing ...
Евгений Юрьевич Родионов
doaj
Two pyridinium‐based ionic liquid templated hybrid manganese halides, (C4Py)2[MnCl4] and (C4Py)2[MnBr4], display similar bulk structures but show significantly different photoluminescence behaviors due to the bromine heavy‐atom effect. Their stable local Mn environments remain intact even in the molten state, allowing applications such as luminescence ...
Biswajit Bhattacharyya +22 more
wiley +1 more source
LL‐37 Driven Phase Transition and Stacking in Oligolamellar Gram‐Negative Bacterial Membrane Models
This work establishes oligolamellar bacterial membrane models to investigate how LL‐37 disrupts the complex dual‐bilayer architecture of Gram‐negative bacteria. Combining SAXS, cryo‐TEM, electrophoretic mobility measurements, and coarse‐grained simulations, it reveals cardiolipin‐driven phase transitions leading to bicelle‐like structures and membrane ...
Bettina Tran +5 more
wiley +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source

