Results 271 to 280 of about 807,165 (362)
Solvent‐Free Thermal Defect Engineering in Molecular Frameworks With Volatile Linkers
Thermal removal of neutral volatile linkers enables precise and solvent‐free generation of metal vacancies in MOFs. This strategy affords redox‐stable, coordinatively unsaturated FeII sites with tunable spin, ligand coordination, and catalytic behavior. The approach offers a general route to design defect‐functional materials through local coordination
Sonia Martínez‐Giménez +9 more
wiley +1 more source
An efficient image encryption algorithm using 3D-cyclic chebyshev map and elliptic curve. [PDF]
Kanwal S +5 more
europepmc +1 more source
Soft Robotic Engines with Non‐Reciprocal Motion by Physical Intelligence
Movement is vital, and it requires breaking symmetry. This study introduces a hydrogel engine that achieves non‐reciprocal motion through kinetic asymmetry in repeated actuation cycles. This approach for breaststroke‐swimming‐like motion is embedded inside the material and establishes a new paradigm of physical intelligence for soft robotics.
Oliver Skarsetz +10 more
wiley +1 more source
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. [PDF]
Sudhakar T, Praveen R, Natarajan V.
europepmc +1 more source
The first room‐temperature, zero‐field observation of stable skyrmion–hopfion spin textures in EuS─Bi2Se3─EuS trilayers is reported. Combining Lorentz TEM imaging and micromagnetic modeling, the authors unveil how interfacial Dzyaloshinskii–Moriya interaction and geometric confinement stabilize these multidimensional topological states.
Ferhat Katmis +11 more
wiley +1 more source
Securing face images in UAV networks using chaos and DNA cryptography approach. [PDF]
Inam S +4 more
europepmc +1 more source
Independent Wavefront Multiplexing with Metasurfaces via Non‐Injective Transformation
In this work, a universal metasurface multiplexing strategy is presented based on non‐injective transformation. By jointly optimizing two metasurfaces, multiplexed channels achieve independent wavefront control, overcoming crosstalk limits of single‐layer designs.
Xiao Jin, Thomas Zentgraf
wiley +1 more source
Block cipher construction using minimum spanning tree from graph theory and its application with image encryption. [PDF]
Rasheed MW +3 more
europepmc +1 more source

