Results 71 to 80 of about 186,193 (271)

A Dualist Account of Phenomenal Concepts [PDF]

open access: yes, 2014
The phenomenal concept strategy is considered a powerful response to anti-physicalist arguments. This physicalist strategy aims to provide a satisfactory account of dualist intuitions without being committed to ontological dualist conclusions.
Fürst, Martina
core  

Unraveling the Molecular Mechanisms of Glioma Recurrence: A Study Integrating Single‐Cell and Spatial Transcriptomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Glioma recurrence severely impacts patient prognosis, with current treatments showing limited efficacy. Traditional methods struggle to analyze recurrence mechanisms due to challenges in assessing tumor heterogeneity, spatial dynamics, and gene networks.
Lei Qiu   +10 more
wiley   +1 more source

Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude

open access: yesIET Information Security, 2023
Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers.
Duong Dinh Tran   +4 more
doaj   +1 more source

Brainstem and Cerebellar Volume Loss and Associated Clinical Features in Progressive Supranuclear Palsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Progressive Supranuclear Palsy (PSP) is a neurodegenerative ‘tauopathy’ with predominating pathology in the basal ganglia and midbrain. Caudal tau spread frequently implicates the cerebellum; however, the pattern of atrophy remains equivocal.
Chloe Spiegel   +8 more
wiley   +1 more source

NTTRU: Truly Fast NTRU Using NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring Z7681[X]/(X768−X384+1) and produces public keys and ciphertexts of approximately 1.25 KB at the 128-bit ...
Vadim Lyubashevsky, Gregor Seiler
doaj   +1 more source

COVID‐19 Vaccination is not Associated with the Development of Idiopathic Inflammatory Myositis in U.S. Veterans

open access: yesArthritis Care &Research, Accepted Article.
Objective Several case reports have proposed a potential association between COVID‐19 vaccination and the subsequent development of idiopathic inflammatory myositis (IIM). This study examined prior COVID‐19 vaccination in US Veterans who developed new‐onset IIM compared to those without new‐onset IIM.
Caleb Hernández   +10 more
wiley   +1 more source

Unlocking the Power of Quercetin‐Encapsulated Mesoporous Bioactive Glass Nanoparticles: A Multifunctional Approach to Bone Regeneration

open access: yesAdvanced Engineering Materials, EarlyView.
Mesoporous bioactive glass nanoparticles (MBGNs) are investigated for bone regeneration given their remarkable structural and functional properties. MBGNs are functionalized with Mn and Cu and incorporated with quercetin, a natural flavonoid exhibiting antioxidant, anti‐inflammatory, and antimicrobial properties.
Giovanni Lo Bello   +5 more
wiley   +1 more source

Enabling Digital Continuity in Virtual Manufacturing for Eco‐Efficiency Assessment of Lightweight Structures by Means of a Domain‐Specific Structural Mechanics Language: Requirements, Idea and Proof of Concept

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel   +3 more
wiley   +1 more source

Public Key Protocols from Twisted-Skew Group Rings

open access: yesCryptography
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings ...
Javier de la Cruz   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy