Stay updated with breaking news from Wang xiaonan. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.
Producing quantum materials with precision, with the help of AI phys.org - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from phys.org Daily Mail and Mail on Sunday newspapers.
Booming semi-finished food market and appetite of young Chinese cgtn.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from cgtn.com Daily Mail and Mail on Sunday newspapers.
In a world redefined by the pandemic, where is globalization headed? | Hellenic Shipping News Worldwide hellenicshippingnews.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from hellenicshippingnews.com Daily Mail and Mail on Sunday newspapers.
Copper, aluminum and zinc should be thrown into chu? Five ministries and commissions investigated the situation of coal hoarding in Caofeidian Port._SMM metal.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from metal.com Daily Mail and Mail on Sunday newspapers.
19-Jan-2021 Researchers from the National University of Singapore (NUS) have developed an anticounterfeiting technology – called DeepKey – based on 2D-material tags and artificial intelligence (AI) authentication software. A key element of their approach is the use of durable identification tags that are not easily damaged by environmental conditions such as extreme temperatures, chemical spills, UV exposure, and moisture, according to the team, led by Chen Po-Yen and Wang Xiaonan from NUS’ Department of Chemical and Biomolecular Engineering. The 2D tags include physically unclonable function (PUF) patterns that are randomly generated by “crumpling” the thin film material used to make them. The PUF pattern is then attached to a QR code to link the authentication element to the cloud and allow traceability, with the PUF lined to the code using a database – a process that can take “less than 3.5 minutes,” according to the researchers. ....