Results 71 to 80 of about 22,366 (192)
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY [PDF]
During this paper, we must have another critical property of smooth projective hash functions. We introduce two games, namely semantic-security against selected keyword attack as well as in distinguish ability against keyword guessing attack1 to capture ...
Kavitha, B., Kumar, Dr. Y.Ravi
core
Abstract A longstanding and significant disparity in representation across gender, economic status, ethnicity, race, and sexual identity exists within STEM doctoral training. Most of the research on the retention and attrition of minoritized PhD STEM students focuses on individual factors, rather than system level issues.
Ida Salusky +4 more
wiley +1 more source
Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley +1 more source
Christian Bohr. Discoverer of Homotropic and Heterotopic Allostery
ABSTRACT This essay recounts and revisits the scientific contributions of Christian Bohr, highlighting his pivotal role in discovering allostery about 120 years ago. Bohr's meticulous experimentation led to identifying two distinct forms of allostery: homotropic (single‐ligand) and heterotropic (multi‐ligand), the latter widely recognized as the Bohr ...
Niels Bindslev
wiley +1 more source
Wearable sensors in paediatric neurology
Types of signals monitored in children's natural environments using wearable sensors, and their associated applications in various paediatric neurological conditions. Plain language summary: https://onlinelibrary.wiley.com/doi/10.1111/dmcn.16267 Abstract Wearable sensors have the potential to transform diagnosis, monitoring, and management of children ...
Camila González Barral, Laurent Servais
wiley +1 more source
An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
PUBLIC KEY ENCRYPTION WITH KEY EXPLORATION FOR SECURED DISTRACT DOUBLE SERVER REPOSITORY [PDF]
One of the key components of our build-to-encrypt general two-key files with keyword search is the function of projection jammers without problems, an idea created by Kramer and Chop.
Fatima, Syeda Asma, Jayachandran, Dr.
core
Leadership in Scholarship: Editors' Appointments and Scientific Narrative
ABSTRACT Academic journals disseminate new knowledge and therefore can influence the direction and composition of ongoing research by choosing what to publish. We study the change in the topic structure of papers published in the American Economic Review (AER) after the appointments of editors and coeditors of the AER between 1985 and 2011 using a ...
Ali Sina Önder +2 more
wiley +1 more source

