Results 61 to 70 of about 11,893 (260)

Annual Banned‐Substance Review 18th Edition—Analytical Approaches in Human Sports Drug Testing 2024/2025

open access: yesDrug Testing and Analysis, EarlyView.
New insights into drug metabolism, distribution, elimination, and detection assays for drugs and methods of sports doping published between 2024 and 2025 are critically reviewed and evaluated in context with the Prohibited List 2025 as established by the World Anti‐Doping Agency.
Mario Thevis, Tiia Kuuranne, Hans Geyer
wiley   +1 more source

Exploring Differences Between Similarly Structured State Higher Education Governing Agencies

open access: yesNew Directions for Higher Education, EarlyView.
ABSTRACT Research examining state higher education governing agencies often focuses on their centralization of authority and structure as key differentiating factors (e.g., consolidated governing agencies vs. coordinating boards vs. planning/regulatory agencies).
Paul G. Rubin, Lucas N. English
wiley   +1 more source

Heat and Cold Waves in Brazil: An ERA5‐Based Analysis of Trends and Seasonality (1980–2024)

open access: yesInternational Journal of Climatology, EarlyView.
This study uses ERA5 reanalysis data to assess changes in extreme heat and cold events across Brazil from 1980 to 2024. Results reveal a sharp increase in heatwave frequency and a general decline in coldwave occurrences, though regional variations are substantial.
Alindomar Lacerda Silva, Scott Sheridan
wiley   +1 more source

From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs

open access: yesThe Laryngoscope, EarlyView.
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson   +7 more
wiley   +1 more source

Comparing the speed of the selected hash and encryption algorithms

open access: yesJournal of Computer Sciences Institute, 2017
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person.
Dawid Górniak, Piotr Kopniak
doaj   +1 more source

Data‐Driven Engineering of Thermostable Collagen‐Mimetic Peptoid Triple Helices

open access: yesMacromolecular Rapid Communications, EarlyView.
Data‐driven active learning discovery of collagen‐mimetic peptoids capable of forming a thermostable collagen‐like triple helix using computational screening followed by experimental validation. ABSTRACT Collagen‐mimetic peptides (CMPs) are engineered molecules designed to replicate the triple‐helical structure of natural collagen.
Alex Berlaga   +6 more
wiley   +1 more source

A Second Preimage Attack on the XOR Hash Combiner

open access: yesIET Information Security
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen   +3 more
doaj   +1 more source

Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier

open access: yesJournal of Mathematical Cryptology, 2016
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin   +2 more
doaj   +1 more source

Enhancing Neural Stem Cell Proliferation Using Polyurethane/CNT Scaffolds Functionalized With Liposomal Hesperidin for Neural Tissue Engineering

open access: yesNano Select, EarlyView.
A multifunctional electrospun scaffold combining polyurethane, carbon nanotubes, and liposomal hesperidin supports neural stem cell survival, adhesion, and expansion. This platform enhances conductivity, mechanical strength, and hydrophilicity while mimicking the native neural environment.
Arman Abroumand Gholami   +8 more
wiley   +1 more source

Solving for Blameless and Optimal Control Under Prioritized Safety Constraints

open access: yesOptimal Control Applications and Methods, EarlyView.
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy