Results 201 to 210 of about 157,357 (284)

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

The end stage of barrier estuary infill: Insights from Jack Smith Lake, Southeastern Australia

open access: yesEarth Surface Processes and Landforms, Volume 51, Issue 5, May 2026.
Infill model for the saline coastal lake estuary, Jack Smith Lake. Abstract Jack Smith Lake in southeastern Australia is an infilled saline coastal lake, disconnected from the ocean by a foredune barrier. This study explores the Holocene infill history of this estuary in order to understand the end‐stage evolution of barrier estuarine systems with ...
David M. Kennedy   +6 more
wiley   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Heat and Cold Waves in Brazil: An ERA5‐Based Analysis of Trends and Seasonality (1980–2024)

open access: yesInternational Journal of Climatology, Volume 46, Issue 6, May 2026.
This study uses ERA5 reanalysis data to assess changes in extreme heat and cold events across Brazil from 1980 to 2024. Results reveal a sharp increase in heatwave frequency and a general decline in coldwave occurrences, though regional variations are substantial.
Alindomar Lacerda Silva, Scott Sheridan
wiley   +1 more source

Advancing iris melanoma brachytherapy: Eye plaque models for Monte Carlo simulations and 3D dosimetric datasets

open access: yesMedical Physics, Volume 53, Issue 5, May 2026.
Abstract Purpose To develop and benchmark eye plaque models for Monte Carlo (MC) simulation of iris melanoma brachytherapy and to develop a database of 3D dose distributions for the iris plaques containing 103Pd${}^{103}{\rm Pd}$, 125I${}^{125}{\rm I}$, and 131Cs${}^{131}{\rm Cs}$ seeds.
Marwa Djedouani   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy