Results 151 to 160 of about 467 (189)

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Ultrasound Modulation of Visual Circuits in Mice Independent of Auditory Confound

open access: yesAdvanced Science, EarlyView.
In this study, Qiu et al. found that low‐intensity ultrasound can directly activate sparse ultrasound‐sensitive neurons (UNs) in the primary visual cortex (V1) of deafened mice. The proportion of these sparse UNs is pressure‐dependent. Furthermore, ultrasound modulates visual circuitry with distinct excitatory and inhibitory effects.
Jiaru He   +8 more
wiley   +1 more source

High‐Fidelity Synthetic Data Replicates Clinical Prediction Performance in a Million‐Patient Diabetes Cohort

open access: yesAdvanced Science, EarlyView.
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño   +5 more
wiley   +1 more source

A Quest for the Mechanism of Ultrahigh Resolution SEM Imaging

open access: yesAdvanced Science, EarlyView.
Using Monte Carlo simulations with explicit definitions of SE1 and SE2 align with a cascade secondary electron production model, this work shows that the 3D nanostructure modulated SE2 emission enhances other than to reduce topographical contrast via a “miniature Faraday cup” effect.
Hao Tian Chen   +3 more
wiley   +1 more source

The present situation and cause analysis of social security sense in backward areas

open access: yes2017 International Conference on Humanities, Arts and Language (HUMAL 2017), 2018
openaire   +1 more source

ROSE: Robust Searchable Encryption With Forward and Backward Security

IEEE Transactions on Information Forensics and Security, 2022
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a promising technique to delegate update and search queries over an outsourced database to an untrusted server while guaranteeing the privacy of data. Many efforts on DSSE have been devoted to obtaining a good tradeoff between security and performance. However, it appears that
Peng Xu   +6 more
openaire   +3 more sources

Geometric Range Search on Encrypted Data With Forward/Backward Security

IEEE Transactions on Dependable and Secure Computing, 2022
This paper presents two dynamic symmetric searchable encryption schemes for geometric range search. Our constructions are the first to provide forward/backward security in the context of SSE-based schemes supporting geometric range search. Besides, we define a security notion called content privacy.
Shabnam Kasra Kermanshahi   +6 more
openaire   +1 more source

VoIP Secure Communication Protocol satisfying Backward Compatibility

2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Several VoIP security protocols have been standardized for preventing many VoIP threats. But since several VoIP carriers have different VoIP protocols, end-to-end VoIP secure communication can not be possible. Also when initiator using secure VoIP phone wants a secure communication with responder using non-VoIP phone such as PSTN phone, or cellular ...
Joongman Kim   +3 more
openaire   +1 more source

Lightweight RFID authentication with forward and backward security

ACM Transactions on Information and System Security, 2011
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG.
Mike Burmester, Jorge Munilla
openaire   +1 more source

Forward and backward secure keyword search with flexible keyword shielding

Information Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Zhijun   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy