Results 141 to 150 of about 15,909 (208)
Multiscale Engineering of Ion‐Conducting Gels for Sustainable Bioelectronic Systems
This review highlights multiscale engineering strategies for ion‐conducting gels aimed at achieving sustainable bioelectronic systems. It systematically examines material‐level, device‐level, and system‐level approaches to ensure long‐term stability and functional integrity under physiological conditions, integrating molecular design, device ...
Ji Hong Kim +6 more
wiley +1 more source
A Causal‐Spatial Explainability Framework for Geological Hazard Susceptibility Modeling
Abstract Data‐driven susceptibility models often act as black boxes, predicting where hazards may occur without explaining why. To address this gap, we propose a Causal‐Prior (CP) framework that integrates validated causal knowledge into training while yielding spatially grounded explanations.
Bo‐Fan Yu +6 more
wiley +1 more source
ABSTRACT High‐quality reference genome assemblies have become essential for deepening our understanding of biodiversity, yet obtaining them for many species remains surprisingly challenging. Drawing on experiences from the European Reference Genome Atlas (ERGA) community, we focus on permit and sample‐handling procedures leading up to nucleic acid ...
Katja Reichel +32 more
wiley +1 more source
Best Practice Principles to Work With Consumer Representatives on Patient Safety Investigation Teams
ABSTRACT Introduction Consumer representatives (CRs), individuals with lived experience and other consumer advisers and volunteers, play an increasing role in advancing consumer‐oriented healthcare. Some health services have begun integrating CRs into patient safety investigation teams with the aim of ensuring patient and family perspectives are ...
Yinghua Yu +10 more
wiley +1 more source
MEAS: memory encryption and authentication secure against side-channel attacks. [PDF]
Unterluggauer T, Werner M, Mangard S.
europepmc +1 more source
NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system. [PDF]
Chatterjee R, Chakraborty R.
europepmc +1 more source
On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices [PDF]
Kitsos, Paris +2 more
core
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Improved meet-in-the-middle attack on Joltik-BC-128
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng +3 more
doaj

