Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Artificial intelligence in preclinical epilepsy research: Current state, potential, and challenges
Abstract Preclinical translational epilepsy research uses animal models to better understand the mechanisms underlying epilepsy and its comorbidities, as well as to analyze and develop potential treatments that may mitigate this neurological disorder and its associated conditions. Artificial intelligence (AI) has emerged as a transformative tool across
Jesús Servando Medel‐Matus +7 more
wiley +1 more source
Intelligent reflecting surface backscatter-enabled physical layer security enhancement <i>via</i> deep reinforcement learning. [PDF]
Ahmed M +7 more
europepmc +1 more source
Real‐time quality and safety monitoring of fruit juice using paper‐based platform
Schematic illustration of a paper‐based biosensor for rapid detection of fruit juice spoilage. Abstract Food spoilage and safety concerns still remain critically challenging within the fruit juice industry, especially as conventional detection methods, though precise, are often too time‐consuming, costly, and reliant on centralized laboratories.
Priti Das +4 more
wiley +1 more source
Secure energy outage analysis of UAV swarm-based network. [PDF]
Nguyen TH, Tran HV.
europepmc +1 more source
Whey protein‐based microencapsulation for omega‐3 PUFA delivery in food systems. Objective: Enhance oxidative stability & bioavailability of omega‐3 PUFAs using whey protein as an encapsulating agent. Current methods: Spray drying & coacervation—effective but limited by heat sensitivity and encapsulation efficiency. Emerging technologies: Electrospray &
Jihan M. Kassem +9 more
wiley +1 more source
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. [PDF]
Xie Q, Ding Z.
europepmc +1 more source
ABSTRACT Workplace bullying (WB) remains a pervasive concern across all sectors, including higher education institutions (HEIs), where shifting power dynamics, performance pressures, and transformation mandates often create fertile ground for systemic abuse.
Helen Meyer
wiley +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Secrecy Enhancement of Multiuser MISO Networks Using OSTBC and Artificial Noise
Maoqiang Yang +5 more
semanticscholar +1 more source

