Results 51 to 60 of about 72,170 (255)

Machine Learning for Green Solvents: Assessment, Selection and Substitution

open access: yesAdvanced Science, EarlyView.
Environmental regulations have intensified demand for green solvents, but discovery is limited by Solvent Selection Guides (SSGs) that quantify solvent sustainability. Training a machine learning model on GlaxoSmithKline SSG, a database of sustainability metrics for 10,189 solvents, GreenSolventDB is developed. Integrated with Hansen solubility metrics,
Rohan Datta   +4 more
wiley   +1 more source

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

open access: yesSensors, 2010
Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue.
Eun-Suk Cho   +3 more
doaj   +1 more source

INB3P: A Multi‐Modal and Interpretable Co‐Attention Framework Integrating Property‐Aware Explanations and Memory‐Bank Contrastive Fusion for Blood–Brain Barrier Penetrating Peptide Discovery

open access: yesAdvanced Science, EarlyView.
INB3P is a multimodal framework for blood–brain barrier‐penetrating peptide prediction under extreme data scarcity and class imbalance. By combining physicochemical‐guided augmentation, sequence–structure co‐attention, and imbalance‐aware optimization, it improves predictive performance and interpretability.
Jingwei Lv   +11 more
wiley   +1 more source

Accelerating Primary Screening of USP8 Inhibitors from Drug Repurposing Databases with Tree‐Based Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng   +4 more
wiley   +1 more source

A Secure Cooperative Sensing Protocol for Cognitive Radio Networks [PDF]

open access: yes, 2010
Cognitive radio networks sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an
Garrigues Olivella, Carles   +1 more
core  

Material‐Based Intelligence: Autonomous Adaptation and Embodied Computation in Physical Substrates

open access: yesAdvanced Intelligent Systems, EarlyView.
This perspective formulates a unifying framework for Material‐Based Intelligence (MBI), defining the physical requirements for materials to achieve embodied action, active memory and embodied information processing through intrinsic nonequilibrium dynamics. The design of intelligent materials often draws parallels with the complex adaptive behaviors of
Vladimir A. Baulin   +4 more
wiley   +1 more source

Analysis and Test of Storage Algorithm of Card Reader of Personnel Positioning System

open access: yesGong-kuang zidonghua, 2012
The paper analyzed three storage algorithms of chain storage algorithm, hash table storage algorithm and hash binary tree storage algorithm which are applicable to the card reader of personnel positioning system in term of search time and storage ...
ZHANG Feng, XU Zhao, ZHANG Kai-ting
doaj  

Digital signatures over HMAC entangled chains

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work we present a new digital signature method based on hash chains and the hash message authentication code (HMAC). Unlike Blockchain technology, our approach establishes that the database of transactions is distributed among users, so each one ...
Luis Adrián Lizama-Pérez
doaj   +1 more source

Fast Verification of Hash Chains [PDF]

open access: yes, 2004
A hash chain is a sequence of hash values x i = hash(x i − 1) for some initial secret value x 0. It allows to reveal the final value x n and to gradually disclose the pre-images x n − 1, x n − 2, ... whenever necessary. The correctness of a given value x i can then be verified by re-computing the chain and comparing the result to x n .
openaire   +1 more source

Blockchain Technology and the Circular Economy Transition: Associations With Company Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy