Results 51 to 60 of about 24,577 (282)

Multi‐Material Additive Manufacturing of Soft Robotic Systems: A Comprehensive Review

open access: yesAdvanced Robotics Research, EarlyView.
This review explores the transformative role of multi‐material additive manufacturing (MMAM) in the development of soft robotic systems. It presents current techniques, materials, and design strategies that enable functionally graded and adaptive structures.
Ritik Raj   +2 more
wiley   +1 more source

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search [PDF]

open access: yesIEEE Access, 2019
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied during recent years. However, most existing SPE solutions focus on the exact keyword matching, which fails to capture the semantic information of documents.
Yu Zhang, Yifan Wang, Yin Li
openaire   +2 more sources

A Curriculum Learning Approach for Multi-domain Text Classification Using Keyword weight Ranking [PDF]

open access: green, 2022
Zilin Yuan   +5 more
openalex   +1 more source

Unveiling Global Diversity of Patescibacteriota and Functional Interactions with Host Microbes

open access: yesAdvanced Science, EarlyView.
Patescibacteriota represents a diverse group of ultra‐small epibiotic bacteria, which is largely overlooked. By integrating ribosomal protein S3‐based community profiling with MAG‐based metabolic potential analyses, this study provides new insights into their distribution, diversity, and potential interactions with other bacteria across diverse ...
Yanhan Ji   +12 more
wiley   +1 more source

Wedelolactone, a Novel TLR2 Agonist, Promotes Neutrophil Differentiation and Ameliorates Neutropenia: A Multi‐Omics Approach to Unravel the Mechanism

open access: yesAdvanced Science, EarlyView.
Wedelolactone (WED), a natural TLR2 agonist, promotes neutrophil differentiation and enhances bactericidal function, offering a potential therapeutic strategy for neutropenia. Using a multi‐omics approach, this study reveals that WED activates the TLR2/MEK/ERK pathway, upregulating key transcription factors (PU.1, CEBPβ) to drive neutrophil development.
Long Wang   +16 more
wiley   +1 more source

OBUSight: Clinically Aligned Generative AI for Ophthalmic Ultrasound Interpretation and Diagnosis

open access: yesAdvanced Science, EarlyView.
OBUSight, a clinically aligned generative AI model that jointly generates reports and predicts diseases through multimodal semantic alignment, was trained and validated on a large multicenter dataset. OBUSight outperformed eight state‐of‐the‐art models, provided clinically reliable reports, enhanced diagnostic efficiency, and achieved performance ...
Xiaocong Liu   +17 more
wiley   +1 more source

Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides

open access: yesAdvanced Science, EarlyView.
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li   +9 more
wiley   +1 more source

Multi-owner accredited keyword search over encrypted data

open access: yesTongxin xuebao, 2017
A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic
Qi-ying WU   +4 more
doaj   +2 more sources

Coverless Multi-keywords Information Hiding Method Based on Text

open access: yesInternational Journal of Security and Its Applications, 2016
As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method can hide only one Chinese character in each natural text. However, the problem of the method is that the hiding capacity is too small.
Zhili Zhou   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy