Results 121 to 130 of about 48,518 (327)
A new DNA strand-based encryption algorithm using symmetric key generation table [PDF]
Qabeela Q. Thabit +2 more
openalex +1 more source
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley +1 more source
Research on cloud storage systems supporting secure sharing
A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient ...
Yan SONG, Zhen HAN, Jian-jun LI, Lei HAN
doaj +2 more sources
A fully flexible ion‐gel‐gated graphene‐channel transistor driven by a triboelectric nanogenerator enables self‐powered tactile sensing and synaptic learning. Mimicking spike‐rate‐dependent plasticity, the device exhibits frequency‐selective potentiation and depression, supporting rate‐coded neuromorphic computation even under flex.
Hanseong Cho +3 more
wiley +1 more source
Actuation of Cell Layers in Three Dimensions
ABSTRACT The alignment of fibers and cells in living tissues affect their mechanical properties and functionality. In this context, one can draw an analogy between tissues and nematic liquid crystal elastomers. We explore this analogy by growing fibroblasts on 2D‐patterned substrates and observing the contraction of cell sheets upon detachment from the
Kirsten Endresen +6 more
wiley +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
Cloud data secure deduplication scheme via role-based symmetric encryption
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG +5 more
doaj +2 more sources
A Scalable Perovskite Platform With Multi‐State Photoresponsivity for In‐Sensor Saliency Detection
A scalable in‐sensor computing platform (32 × 32 array) with ultra‐low variability is developed by incorporating ferroelectric copolymers into halide perovskite thin films. These devices achieve 1000 programmable photoresponsivity states and high thermal reliability.
Xuechao Xing +10 more
wiley +1 more source
SWiSSSE: System-Wide Security for Searchable Symmetric Encryption [PDF]
Zichen Gui +3 more
openalex +1 more source
Plasmonic Nanomachines: Creating Local Potential Gradients and Motions
Plasmonic nanomachines can generate optical, thermal, and chemical potential gradients to drive directional rectilinear, rotational, and twisting motions at the nanometer scale. The integration of multimodal plasmonic forces with functional materials and programmed structural distortions enables precise spatiotemporal actuation, thereby providing a ...
Yoonhee Kim +3 more
wiley +1 more source

