Results 71 to 80 of about 3,657 (190)

Atomistic Modeling of Methyl Formate and Glycolaldehyde Formation on Interstellar Dirty Ice Mantles via a “Radical + Ice” Mechanism

open access: yesChemPlusChem, Volume 90, Issue 11, November 10, 2025.
The presence of interstellar complex organic molecules (COMs) has been baffling astrochemists for a long time. Methyl formate and glycolaldehyde are widely detected but their abundances mismatch kinetic astrochemical model predictions. Here, the formation of these two COMs is characterized onto a mixed ice surface, highlighting the importance of ...
Jessica Perrero   +3 more
wiley   +1 more source

A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY [PDF]

open access: yes, 2018
During this paper, we must have another critical property of smooth projective hash functions. We introduce two games, namely semantic-security against selected keyword attack as well as in distinguish ability against keyword guessing attack1 to capture ...
Kavitha, B., Kumar, Dr. Y.Ravi
core  

AAPM WGTEACH Report 366: Best practices in the teaching and mentoring of medical physics

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 10, October 2025.
Abstract Working Group on Teaching Educators and Clinicians How (WGTEACH) has been charged with writing a report to review best, evidence‐based practices in various aspects of the teaching of medical physics. These aspects include not only didactic teaching and mentoring in the classroom and clinic, but also teaching K‐12 and undergraduate students and
Victor J. Montemayor   +13 more
wiley   +1 more source

Heavy‐element damage seeding in proteins under XFEL illumination

open access: yesJournal of Synchrotron Radiation, Volume 32, Issue 5, Page 1124-1142, September 2025.
Plasma simulations with detailed modeling of unbound electron dynamics predict that heavy elements contribute significantly to radiation damage suffered by proteins in serial femtosecond crystallography. New methods to mitigate radiation damage in this regime are highlighted.Serial femtosecond X‐ray crystallography (SFX) captures the structure and ...
Spencer K. Passmore   +3 more
wiley   +1 more source

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

The sense that we're invisible: A longitudinal analysis of diverse women's experiences with structural violence in biomedical doctoral programs

open access: yesJournal of Research in Science Teaching, Volume 62, Issue 6, Page 1492-1521, August 2025.
Abstract A longstanding and significant disparity in representation across gender, economic status, ethnicity, race, and sexual identity exists within STEM doctoral training. Most of the research on the retention and attrition of minoritized PhD STEM students focuses on individual factors, rather than system level issues.
Ida Salusky   +4 more
wiley   +1 more source

Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems

open access: yesRisk Analysis, Volume 45, Issue 8, Page 2390-2414, August 2025.
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley   +1 more source

Ethical governance of clinical research on the brain–computer interface for mental disorders: a modified Delphi study

open access: yesGeneral Psychiatry, Volume 38, Issue 4, August 2025.
Background Clinical brain–computer interface (BCI) for mental disorders is an emerging interdisciplinary research field, posing new ethical concerns and challenges, yet lacking practical ethical governance guidelines for stakeholders and the entire community.
Qing Zhang   +8 more
wiley   +1 more source

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

PUBLIC KEY ENCRYPTION WITH KEY EXPLORATION FOR SECURED DISTRACT DOUBLE SERVER REPOSITORY [PDF]

open access: yes, 2018
One of the key components of our build-to-encrypt general two-key files with keyword search is the function of projection jammers without problems, an idea created by Kramer and Chop.
Fatima, Syeda Asma, Jayachandran, Dr.
core  

Home - About - Disclaimer - Privacy