Results 81 to 90 of about 251,490 (326)

An Effective Private Data storage and Retrieval System using Secret sharing scheme based on Secure Multi-party Computation

open access: yes, 2015
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable ...
Binu, V. P.   +2 more
core   +1 more source

Charting the Path to Increased Oil Palm Output in Ghana Beyond Area Expansion: Technology or Managerial Capacity — Which Leads the Way?

open access: yesAgribusiness, EarlyView.
ABSTRACT This study sets out to investigate the prospects for raising oil palm output in sub‐Saharan Africa, particularly Ghana, without further expansion of cropland. Given global concerns about oil palm's role in deforestation and land use change, the focus is on enhancing productivity on existing farmlands.
Jacob Asravor   +3 more
wiley   +1 more source

Artificial Intelligence for Bone: Theory, Methods, and Applications

open access: yesAdvanced Intelligent Discovery, EarlyView.
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan   +3 more
wiley   +1 more source

Quantum private queries

open access: yes, 2007
We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity.
A. Ambainis   +10 more
core   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

A Generalized Framework for Data‐Efficient and Extrapolative Materials Discovery for Gas Separation

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces an iterative supervised machine learning framework for metal‐organic framework (MOF) discovery. The approach identifies over 97% of the best performing candidates while using less than 10% of available data. It generalizes across diverse MOF databases and gas separation scenarios.
Varad Daoo, Jayant K. Singh
wiley   +1 more source

HET-PIR: practical Keyword PIR via a Novel homomorphic equality test Algorithm

open access: yesCybersecurity
Fully homomorphic encryption (FHE) enables arbitrary computations on encrypted data while preserving strong privacy guarantees. However, the high computational cost of homomorphic operations, particularly multiplication and comparisons, remains a ...
Peizhe Song, Mingsheng Wang
doaj   +1 more source

Efficient and secure outsourcing of genomic data storage

open access: yesBMC Medical Genomics, 2017
Background Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related ...
João Sá Sousa   +6 more
doaj   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Parallel private information retrieval protocol with index anonymity for untrusted databases

open access: yesJournal of King Saud University: Computer and Information Sciences
Private information retrieval (PIR) enables a client to search data from a single (or multiple) untrusted server, without revealing which entry was queried. PIR can be divided into two categories: information-theoretic PIR (IT-PIR) and computational PIR (
Xiaopeng Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy