Results 71 to 80 of about 1,131 (250)
ML Workflows for Screening Degradation‐Relevant Properties of Forever Chemicals
The environmental persistence of per‐ and polyfluoroalkyl substances (PFAS) necessitates efficient remediation strategies. This study presents physics‐informed machine learning workflows that accurately predict critical degradation properties, including bond dissociation energies and polarizability.
Pranoy Ray +3 more
wiley +1 more source
Sustainable Materials Design With Multi‐Modal Artificial Intelligence
Critical mineral scarcity, high embodied carbon, and persistent pollution from materials processing intensify the need for sustainable materials design. This review frames the problem as multi‐objective optimization under heterogeneous, high‐dimensional evidence and highlights multi‐modal AI as an enabling pathway.
Tianyi Xu +8 more
wiley +1 more source
Secure Proxy Re-Encryption Protocol for FANETs Resistant to Chosen-Ciphertext Attacks
In emergency situations, ensuring the secure transmission of medical information is critical. While existing schemes address on-road emergencies, off-road scenarios present unique challenges due to hazardous locations inaccessible to conventional ...
Hyun-A Park
doaj +1 more source
We investigate whether Montessori and traditional schooling systems shape the developmental trajectory of large‐scale brain dynamics in different ways. We quantify the arrow of time (“non‐reversibility”) in neural activity during resting state and movie‐watching, revealing distinct maturational patterns.
Elvira del Agua +6 more
wiley +1 more source
Background: The sharing of electronic health records among hospitals is crucial for ensuring consistent patient treatment. However, the process remains challenging due to the existence of varied systems, privacy concerns and interoperability issues.
Devaramane Yogaraj Ashwini +1 more
doaj +1 more source
Short‐range order in 2D transition metal dichalcogenides is revealed as a new design paradigm. Driven by chemical affinity and atomic size, it governs properties across scales. Weak ordering tunes site‐resolved magnetism and d‐band centers, while strong ordering eliminates gap states to open band gaps.
Hanyu Liu +3 more
wiley +1 more source
Server-aided access control for cloud computing
With the massive diffusion of cloud computing,more and more sensitive data is being centralized into the cloud for sharing,which brings forth new challenges for the security and privacy of outsourced data.To address these challenges,the server-aided ...
WENG Jian,WENG Jia-si,LIUJia-nan,HOU Lin
doaj +1 more source
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation. [PDF]
Lin HY, Tsai TT, Ting PY, Fan YR.
europepmc +1 more source
Proxy re‐encryption via indistinguishability obfuscation
AbstractIn this paper, we present a proxy re‐encryption (PRE) scheme via an indistinguishability obfuscation () by adding two algorithms to the public key encryption scheme by Sahai and Waters' (STOC 2014). Although a re‐encryption function from one public key to another can be considered as a randomized functionality on the underlying plaintext and ...
Satsuya Ohata, Kanta Matsuura
openaire +1 more source
ABSTRACT Methane's efficient catalytic removal is vital for sustainable development. Bimetallic catalysts, though promising for methane activation, pose a design challenge due to their complex compositional space. This work introduces an integrated framework that combines high‐throughput density functional theory (DFT) and interpretable machine ...
Mingzhang Pan +8 more
wiley +1 more source

