Results 41 to 50 of about 7,683 (138)
Artificial intelligence‐powered microscopy: Transforming the landscape of parasitology
Abstract Microscopy and image analysis play a vital role in parasitology research; they are critical for identifying parasitic organisms and elucidating their complex life cycles. Despite major advancements in imaging and analysis, several challenges remain. These include the integration of interdisciplinary data; information derived from various model
Mariana De Niz +4 more
wiley +1 more source
Manipulating Individual Topological Solitons and Bisolitons in an Electronic System
While localized topological modes in quantum materials promise loss‐less delivery of classical and quantum information, manipulating them individually has been challenging. This work succeeded in manipulating topological solitons formed along atomic wires on silicon surfaces with high reproducibility in various ways, including translating, transforming
Taehwan Im +2 more
wiley +1 more source
Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core +2 more sources
Robotic Needle Steering for Percutaneous Interventions: Sensing, Modeling, and Control
This review examines recent advances in robotic needle steering for percutaneous interventions, highlighting closed‐loop sensing, physics‐informed tissue‐needle interaction modeling, and real‐time trajectory planning and control. It synthesizes innovations in deep learning, fiber‐optic feedback, and adaptive control strategies, and outlines emerging ...
Fangjiao Zhao +5 more
wiley +1 more source
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley +1 more source
This study used interpretable machine learning to identify dietary nutrient patterns associated with depression‐stroke comorbidity in U.S. adults aged 50 years and older. While overall nutrient mixtures showed no significant association, specific micronutrients including vitamins B1, B12, and C, zinc, and caffeine consistently predicted comorbidity ...
Hongwei Liu +4 more
wiley +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
A C++ Class for Analyzing Vector Boolean Functions from a Cryptographic Perspective [PDF]
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by some more ...
Alvarez Cubero, Jose Antonio +1 more
core
The paper proposes a piecewise analytical method for calculating the winding current and the neutral reactor current under oscillatory conditions in renewable energy power systems. The method is based on the operational state of the core magnetic circuit, where the nonlinear magnetisation curve is approximated by piecewise linear segments with the ...
Botong Li +8 more
wiley +1 more source
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source

