Results 41 to 50 of about 7,683 (138)

Artificial intelligence‐powered microscopy: Transforming the landscape of parasitology

open access: yesJournal of Microscopy, Volume 301, Issue 2, Page 280-329, February 2026.
Abstract Microscopy and image analysis play a vital role in parasitology research; they are critical for identifying parasitic organisms and elucidating their complex life cycles. Despite major advancements in imaging and analysis, several challenges remain. These include the integration of interdisciplinary data; information derived from various model
Mariana De Niz   +4 more
wiley   +1 more source

Manipulating Individual Topological Solitons and Bisolitons in an Electronic System

open access: yesAdvanced Materials, Volume 38, Issue 3, 13 January 2026.
While localized topological modes in quantum materials promise loss‐less delivery of classical and quantum information, manipulating them individually has been challenging. This work succeeded in manipulating topological solitons formed along atomic wires on silicon surfaces with high reproducibility in various ways, including translating, transforming
Taehwan Im   +2 more
wiley   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Robotic Needle Steering for Percutaneous Interventions: Sensing, Modeling, and Control

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 1, January 2026.
This review examines recent advances in robotic needle steering for percutaneous interventions, highlighting closed‐loop sensing, physics‐informed tissue‐needle interaction modeling, and real‐time trajectory planning and control. It synthesizes innovations in deep learning, fiber‐optic feedback, and adaptive control strategies, and outlines emerging ...
Fangjiao Zhao   +5 more
wiley   +1 more source

Quantitative Assessment Model for Technology Transfer Risks in University‐Enterprise Collaborative Innovation: Based on Multi‐Objective Optimization Strategy of Deep Adversarial Reinforcement Learning

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley   +1 more source

Using SHAP and LIME to Explain Machine Learning Models Predicting Comorbid Depression and Stroke From Daily Dietary Nutrient Intake in a US Population‐Based Study

open access: yesFood Science &Nutrition, Volume 14, Issue 1, January 2026.
This study used interpretable machine learning to identify dietary nutrient patterns associated with depression‐stroke comorbidity in U.S. adults aged 50 years and older. While overall nutrient mixtures showed no significant association, specific micronutrients including vitamins B1, B12, and C, zinc, and caffeine consistently predicted comorbidity ...
Hongwei Liu   +4 more
wiley   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

A C++ Class for Analyzing Vector Boolean Functions from a Cryptographic Perspective [PDF]

open access: yes, 2010
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by some more ...
Alvarez Cubero, Jose Antonio   +1 more
core  

Calculation Method for Magnetic Saturation Current of Shunt Reactors Under Oscillation in Renewable Energy Power Systems

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
The paper proposes a piecewise analytical method for calculating the winding current and the neutral reactor current under oscillatory conditions in renewable energy power systems. The method is based on the operational state of the core magnetic circuit, where the nonlinear magnetisation curve is approximated by piecewise linear segments with the ...
Botong Li   +8 more
wiley   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy