News
Abstract: Physical Unclonable Functions (PUFs) are frequently exploited for security purposes. In particular, they are adopted to generate unique authentication passwords and cryptographic keys, with ...
A novel EXAFS fitting strategy is proposed to deliver reasonable fitting parameters. Moreover, a 2D wavelet transform with XANES could deliver another viewpoint of the adsorption mechanisms. Based on ...
Linear algebra, eigenvalues, FFT, Bessel, elliptic, orthogonal polys, geometry, NURBS, numerical quadrature, 3D transfinite interpolation, random numbers, Mersenne ...
First, a 1D Fourier transform over longitude, for each latitudinal ring. Second, a projection onto the real polar-d functions. One may precompute and store all real polar-d functions for extreme ...
Within the wide range of hyphenated techniques, the coupling of GC to Fourier Transform Infrared Spectroscopy (FTIR ... by plotting the chromatographic peak area as a function of the analyte ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results