Results 41 to 50 of about 11,914 (236)
Despite significant advances, most academic research fails to result in medical products that benefit patients. This guide shares five key steps to help researchers close that gap: set clear goals, test thoroughly, protect ideas, build diverse teams, and partner with industry.
Cristina Oldani +4 more
wiley +1 more source
A Novel Secret Sharing Method Based on Binary Sequence
A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not ...
Yexia Cheng +5 more
doaj +2 more sources
Structural Mechanism of an Efficacy Photoswitch Targeting the β2‐adrenergic Receptor
Time‐resolved structures from x‐ray free‐electron laser measurements combined with cellular assays demonstrate how the photoswitchable β‐blocker photoazolol‐1 acts as an efficacy switch of β2‐adrenergic receptor function. Light‐induced ligand repositioning shifts activity from inverse agonism toward neutral antagonism by altering local helical ...
Robin Stipp +29 more
wiley +1 more source
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea +1 more
doaj +1 more source
ABSTRACT Greenhouse gas (GHG) emissions have emerged as one of the most critical drivers of climate change; this is primarily due to high concentrations and long atmospheric life of carbon dioxide (CO2). For a significant amount of time, various biological processes such as microalgal cultivation, cyanobacterial systems, photosynthetic microorganisms ...
Sadhana Semwal, Harish Chandra Joshi
wiley +1 more source
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P. +1 more
doaj +1 more source
Some Multisecret-Sharing Schemes over Finite Fields
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj +1 more source
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen +3 more
wiley +1 more source
Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj +1 more source
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley +1 more source

