Results 61 to 70 of about 24,577 (282)

AI‐Based D‐Amino Acid Substitution for Optimizing Antimicrobial Peptides to Treat Multidrug‐Resistant Bacterial Infection

open access: yesAdvanced Science, EarlyView.
This study constructed the first D‐amino acid antimicrobial peptide dataset and developed an AI model for efficient screening of substitution sites, with 80% of candidate peptides showing enhanced activity. The lead peptide dR2‐1 demonstrated potent antimicrobial activity in vitro and in vivo, high stability, and low toxicity.
Yinuo Zhao   +14 more
wiley   +1 more source

Bibliometric study of multi-scale calculation of carbon nanotubes

open access: yesResults in Physics
CiteSpace III software was used for bibliometric research on the development of multi-scale calculation of carbon nanotubes. By analyzing 1253 relevant articles in the SCI Expanded database, the methods including keyword time zone map, literature co ...
Ruihang Huang
doaj   +1 more source

MicrobeDiscover: A Knowledge Graph–Enabled AI Framework for Identifying Microbes for Inorganic Nanomaterial Biosynthesis

open access: yesAdvanced Science, EarlyView.
Microbial synthesis of nanomaterials (NMs) is eco‐friendly, but the screening of microorganisms is limited by inefficient traditional methods (currently only involving∽400 microorganisms/90 NMs). We propose AI framework MicrobeDiscover, integrating a knowledge graph of microbe‐NM interactions.
Ludi Wang   +12 more
wiley   +1 more source

High‐Conductivity Electrolytes Screened Using Fragment‐ and Composition‐Aware Deep Learning

open access: yesAdvanced Science, EarlyView.
We present a new deep learning framework that hierarchically links molecular and functional unit attributions to predict electrolyte conductivity. By integrating molecular composition, ratios, and physicochemical descriptors, it achieves accurate, interpretable predictions and large‐scale virtual screening, offering chemically meaningful insights for ...
Xiangwen Wang   +6 more
wiley   +1 more source

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

open access: yesCommunications on Applied Electronics, 2016
To get more flexibility, data owner interested to outsource their complex data set on the cloud. Cloud computing provides data outsourcing and data high quality service. For data security, the data owner provides encryption on their data. Hence, for Low cost and low computational overhead the data owner migrates their data on the cloud.
Arti Mohanpurkar, Pradnya H.
openaire   +1 more source

How AI Shapes the Future Landscape of Sustainable Building Design With Climate Change Challenges?

open access: yesAdvanced Science, EarlyView.
This review examines how artificial intelligence reshapes sustainable building design faced with climate change challenges. The authors synthesize existing studies to demonstrate AI's transformative potential across design lifecycle phases from climate‐aware form generation to performance optimization.
Pengyuan Shen   +5 more
wiley   +1 more source

Multi-keyword public key searchable encryption scheme with pattern hiding

open access: yesTongxin xuebao
To address the limitations of existing multi-user searchable encryption (SE) schemes that fail to hide access patterns, search patterns, and resist keyword guessing attacks, a novel public-key searchable encryption scheme was proposed supporting multi ...
NIE Xuyun   +6 more
doaj  

Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing*

open access: diamond, 2021
Jing Zhu   +4 more
openalex   +1 more source

Farmers’ Protests in Germany: Media Coverage and Types of Bias

open access: yesAgribusiness, EarlyView.
ABSTRACT The German farmers’ protests of 2024 sparked widespread media coverage and public debate. Yet, media coverage was not always positive, reflecting the media's attention‐seeking and selective focus. Occurrences of farmers blocking media outlets reflected distrust in how their concerns were portrayed.
Felix Schlichte, Doris Läpple
wiley   +1 more source

BC-RFMS: blockchain-based rankable fuzzy multi-keyword search scheme [PDF]

open access: yesBlockchain
The cloud provides convenient storage services for the vast amount of data generated by the Internet of Things (IoT), yet it also introduces security challenges such as data tampering and privacy breaches to IoT.
Lixiang Zheng   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy