Results 51 to 60 of about 19,326 (124)
The presence of interstellar complex organic molecules (COMs) has been baffling astrochemists for a long time. Methyl formate and glycolaldehyde are widely detected but their abundances mismatch kinetic astrochemical model predictions. Here, the formation of these two COMs is characterized onto a mixed ice surface, highlighting the importance of ...
Jessica Perrero +3 more
wiley +1 more source
AAPM WGTEACH Report 366: Best practices in the teaching and mentoring of medical physics
Abstract Working Group on Teaching Educators and Clinicians How (WGTEACH) has been charged with writing a report to review best, evidence‐based practices in various aspects of the teaching of medical physics. These aspects include not only didactic teaching and mentoring in the classroom and clinic, but also teaching K‐12 and undergraduate students and
Victor J. Montemayor +13 more
wiley +1 more source
Heavy‐element damage seeding in proteins under XFEL illumination
Plasma simulations with detailed modeling of unbound electron dynamics predict that heavy elements contribute significantly to radiation damage suffered by proteins in serial femtosecond crystallography. New methods to mitigate radiation damage in this regime are highlighted.Serial femtosecond X‐ray crystallography (SFX) captures the structure and ...
Spencer K. Passmore +3 more
wiley +1 more source
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj +1 more source
An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj +1 more source
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
Abstract A longstanding and significant disparity in representation across gender, economic status, ethnicity, race, and sexual identity exists within STEM doctoral training. Most of the research on the retention and attrition of minoritized PhD STEM students focuses on individual factors, rather than system level issues.
Ida Salusky +4 more
wiley +1 more source
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley +1 more source
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Background Clinical brain–computer interface (BCI) for mental disorders is an emerging interdisciplinary research field, posing new ethical concerns and challenges, yet lacking practical ethical governance guidelines for stakeholders and the entire community.
Qing Zhang +8 more
wiley +1 more source

