Results 81 to 90 of about 319,858 (317)

Integrated semi‐quantum layered communication

open access: yesIET Quantum Communication
In recent times, secure quantum communication in layered networks has emerged as an important area of study. The authors harness the potential offered by multidimensional states in secure quantum communication with only one quantum participant and all ...
Rajni Bala   +2 more
doaj   +1 more source

Fraction-Integer Mehod (FIM) for Calculating Multiplicative Inverse [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
Multiplicative inverse is a crucial operation in public key cryptography. Public key cryptography has given rise to such a need, in which we need to generate a related public/private pair of numbers, each of which is the inverse of the other.
Sattar Aboud
doaj  

Dual Charge Transfer Mechanisms in Intimately Bonded S‐scheme Heterojunction Photocatalyst with Expeditious Activity toward Environmental Remediation

open access: yesAdvanced Sustainable Systems, EarlyView.
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa   +11 more
wiley   +1 more source

LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM

open access: yesScience Journal of University of Zakho, 2023
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer   +2 more
doaj   +1 more source

Applications of Artificial Intelligence in Drug Repurposing

open access: yesAdvanced Science, EarlyView.
Artificial intelligence algorithms are transforming drug repurposing by revealing new therapeutic targets and mechanisms. This review highlights the integration of AI frameworks, multimodal datasets, and advanced optimization methods, accelerating the discovery of new indications for existing drugs.
Zhaoman Wan   +6 more
wiley   +1 more source

Attestation Infrastructures for Private Wallets [PDF]

open access: yesarXiv, 2021
In this paper we focus on one part of the trust infrastructures needed for the future virtual assets industry, namely the attestation infrastructure related to key management in private wallet systems. Our focus is on regulated private wallets utilizing trusted hardware, and the capability of the wallet to yield attestation evidence suitable to address
arxiv  

Private quantum codes: introduction and connection with higher rank numerical ranges [PDF]

open access: yesLinear and Multilinear Algebra, 62, pp. 639-647, 2014, 2014
We give a brief introduction to private quantum codes, a basic notion in quantum cryptography and key distribution. Private code states are characterized by indistinguishability of their output states under the action of a quantum channel, and we show that higher rank numerical ranges can be used to describe them.
arxiv   +1 more source

Rational Design and Organoid‐Based Evaluation of a Cocktail CAR‐γδ T Cell Therapy for Heterogeneous Glioblastoma

open access: yesAdvanced Science, EarlyView.
A novel “prof” cocktail therapy is designed. It screens antigens, selects personalized antigen panels, engineers optimized CAR‐Vδ1 T cells, and tests in patient‐derived GBM organoids, offering hope for effective CAR‐T drugs against heterogeneous solid tumors. Abstract Various challenges, including tumor heterogeneity and inadequate T cell infiltration,
Guidong Zhu   +12 more
wiley   +1 more source

DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption [PDF]

open access: yesarXiv, 2020
The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients' medical imaging data. In this paper, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medical
arxiv  

Multi‐country perspectives on best practices and barriers to preference elicitation lab‐in‐the‐field experiments with farmers

open access: yesApplied Economic Perspectives and Policy, EarlyView.
Abstract In this study, we define, categorize, and systematically describe best practices and barriers to implementing preference elicitation lab‐in‐the‐field experiments with farmers based on qualitative, in‐depth interviews with researchers from the Research Network on Economic Experiments for the Common Agricultural Policy (REECAP).
Marieke Cornelia Baaken   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy