Results 171 to 180 of about 55,508 (260)

Food Safety in the Catering Sector: Nonconformities, Challenges, and Strategic Interventions With Insights From South Asia and Africa

open access: yesFood Science &Nutrition, Volume 14, Issue 1, January 2026.
Urgent attention to global food safety in catering is necessary to address hygiene, training, and tech‐based strategies to counter foodborne diseases. ABSTRACT Food safety in the catering sector is an essential public health issue, as foodborne diseases (FBDs) continue to pose significant threats worldwide.
Anwar Ali   +7 more
wiley   +1 more source

Risks of Time and Chronology as an Underpinning Infrastructure for Critical Systems: Emerging Chronorisks and Chronosecurity Needs

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT Time and chronology form the invisible architecture upon which modern civilization depends, governing synchronization across markets, power grids, communication networks, transportation, and defense. Yet, this shared temporal framework, engineered through atomic clocks, satellites, and digital synchronization, faces growing vulnerabilities ...
Bilal M. Ayyub
wiley   +1 more source

A Mechanism‐Based Multi‐Level Population PK/PD Model for Potassium‐Competitive Acid Blockers

open access: yesCPT: Pharmacometrics &Systems Pharmacology, Volume 15, Issue 1, January 2026.
Schematic overview of a mechanism‐based, multi‐level population model for potassium‐competitive acid blockers. ABSTRACT Potassium‐competitive acid blockers (PCABs) are emerging alternatives to proton pump inhibitors for the treatment of acid‐related diseases.
Woojin Jung   +6 more
wiley   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy