Results 171 to 180 of about 147,541 (282)
Further observations on the security of Speck32-like ciphers using machine learning. [PDF]
Hou Z, Ren J, Chen S.
europepmc +1 more source
The detection of toxins in baby food using artificial intelligence. ABSTRACT Infant foods and baby formulas are becoming increasingly popular across the globe owing to their ease of consumption and nutritional value specific to infants. Impurities may find their way into the food chain at any point from the acquisition of raw materials to final ...
Poornima Singh +3 more
wiley +1 more source
Insights into tea tree oil-mediated transcriptome modulation in Rosa hybrida. [PDF]
Lopez-Jimenez J +4 more
europepmc +1 more source
Aloe vera‐derived biopolymers and nanoformulations enhance antimicrobial, antioxidant, and barrier functions in clean‐label edible coatings and films, whereas safety‐critical anthraquinone thresholds and regulatory constraints shape their translational potential.
Acharya Balkrishna +6 more
wiley +1 more source
Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares. [PDF]
Nujumudeen F, Mubarak DMN, Hussain T.
europepmc +1 more source
ABSTRACT Rising numbers of refugees, prolonged displacement and reduced funding have led to challenges in terms of how to address their healthcare needs, with different approaches taken, ranging from parallel mechanisms to arrangements that are integrated (to different extents) within the national health system. Increasingly, global frameworks call for
Maria Paola Bertone +13 more
wiley +1 more source
CCIW: Cover-Concealed Image Watermarking for Dual Protection of Privacy and Copyright. [PDF]
Li R, Wang S, Li M, Ren H.
europepmc +1 more source
ABSTRACT Workplace bullying (WB) remains a pervasive concern across all sectors, including higher education institutions (HEIs), where shifting power dynamics, performance pressures, and transformation mandates often create fertile ground for systemic abuse.
Helen Meyer
wiley +1 more source
Hybrid Vigenere and elliptic curve cryptography technique over the finite field [Formula: see text]. [PDF]
El Bourakkadi H +5 more
europepmc +1 more source
The Structure of Informal Learning in the Workplace—An Experience Sampling Approach
ABSTRACT This paper complements retrospective approaches to researching informal learning in the workplace with experience sampling. Since (conscious) informal learning is becoming increasingly important for successfully keeping pace with rapid changes in working environments, a clear understanding of the construct and its precise measurement are ...
Katja Häußermann, Tina Seufert
wiley +1 more source

