Results 51 to 60 of about 19,326 (124)

Atomistic Modeling of Methyl Formate and Glycolaldehyde Formation on Interstellar Dirty Ice Mantles via a “Radical + Ice” Mechanism

open access: yesChemPlusChem, Volume 90, Issue 11, November 10, 2025.
The presence of interstellar complex organic molecules (COMs) has been baffling astrochemists for a long time. Methyl formate and glycolaldehyde are widely detected but their abundances mismatch kinetic astrochemical model predictions. Here, the formation of these two COMs is characterized onto a mixed ice surface, highlighting the importance of ...
Jessica Perrero   +3 more
wiley   +1 more source

AAPM WGTEACH Report 366: Best practices in the teaching and mentoring of medical physics

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 10, October 2025.
Abstract Working Group on Teaching Educators and Clinicians How (WGTEACH) has been charged with writing a report to review best, evidence‐based practices in various aspects of the teaching of medical physics. These aspects include not only didactic teaching and mentoring in the classroom and clinic, but also teaching K‐12 and undergraduate students and
Victor J. Montemayor   +13 more
wiley   +1 more source

Heavy‐element damage seeding in proteins under XFEL illumination

open access: yesJournal of Synchrotron Radiation, Volume 32, Issue 5, Page 1124-1142, September 2025.
Plasma simulations with detailed modeling of unbound electron dynamics predict that heavy elements contribute significantly to radiation damage suffered by proteins in serial femtosecond crystallography. New methods to mitigate radiation damage in this regime are highlighted.Serial femtosecond X‐ray crystallography (SFX) captures the structure and ...
Spencer K. Passmore   +3 more
wiley   +1 more source

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search

open access: yesIEEE Access, 2019
Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either what is searched for or the contents of the searched data ciphertexts.
Yang Lu, Jiguo Li, Yichen Zhang
doaj   +1 more source

An Efficient Public Key Searchable Encryption Scheme for Mobile Smart Terminal

open access: yesIEEE Access, 2020
With the wide application of the mobile smart terminals, the data privacy protection of the mobile smart terminals stored in the cloud is more and more important.
Ningbin Yang, Shumei Xu, Zhou Quan
doaj   +1 more source

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

The sense that we're invisible: A longitudinal analysis of diverse women's experiences with structural violence in biomedical doctoral programs

open access: yesJournal of Research in Science Teaching, Volume 62, Issue 6, Page 1492-1521, August 2025.
Abstract A longstanding and significant disparity in representation across gender, economic status, ethnicity, race, and sexual identity exists within STEM doctoral training. Most of the research on the retention and attrition of minoritized PhD STEM students focuses on individual factors, rather than system level issues.
Ida Salusky   +4 more
wiley   +1 more source

Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems

open access: yesRisk Analysis, Volume 45, Issue 8, Page 2390-2414, August 2025.
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley   +1 more source

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Ethical governance of clinical research on the brain–computer interface for mental disorders: a modified Delphi study

open access: yesGeneral Psychiatry, Volume 38, Issue 4, August 2025.
Background Clinical brain–computer interface (BCI) for mental disorders is an emerging interdisciplinary research field, posing new ethical concerns and challenges, yet lacking practical ethical governance guidelines for stakeholders and the entire community.
Qing Zhang   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy