Results 81 to 90 of about 319,858 (317)
Integrated semi‐quantum layered communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala+2 more
doaj +1 more source
Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa+11 more
wiley +1 more source
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer +2 more
doaj +1 more source
Applications of Artificial Intelligence in Drug Repurposing
Artificial intelligence algorithms are transforming drug repurposing by revealing new therapeutic targets and mechanisms. This review highlights the integration of AI frameworks, multimodal datasets, and advanced optimization methods, accelerating the discovery of new indications for existing drugs.
Zhaoman Wan+6 more
wiley +1 more source
Attestation Infrastructures for Private Wallets [PDF]
In this paper we focus on one part of the trust infrastructures needed for the future virtual assets industry, namely the attestation infrastructure related to key management in private wallet systems. Our focus is on regulated private wallets utilizing trusted hardware, and the capability of the wallet to yield attestation evidence suitable to address
arxiv
Private quantum codes: introduction and connection with higher rank numerical ranges [PDF]
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show that higher rank numerical ranges can be used to describe them.
arxiv +1 more source
A novel “prof” cocktail therapy is designed. It screens antigens, selects personalized antigen panels, engineers optimized CAR‐Vδ1 T cells, and tests in patient‐derived GBM organoids, offering hope for effective CAR‐T drugs against heterogeneous solid tumors. Abstract Various challenges, including tumor heterogeneity and inadequate T cell infiltration,
Guidong Zhu+12 more
wiley +1 more source
DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption [PDF]
The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients' medical imaging data. In this paper, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medical
arxiv
Abstract In this study, we define, categorize, and systematically describe best practices and barriers to implementing preference elicitation lab‐in‐the‐field experiments with farmers based on qualitative, in‐depth interviews with researchers from the Research Network on Economic Experiments for the Common Agricultural Policy (REECAP).
Marieke Cornelia Baaken+16 more
wiley +1 more source