Results 41 to 50 of about 11,914 (236)

Translating Biomedical Research to Medical Devices: A Practical Guide and the Arteriovenous Graft Case Study

open access: yesAdvanced NanoBiomed Research, EarlyView.
Despite significant advances, most academic research fails to result in medical products that benefit patients. This guide shares five key steps to help researchers close that gap: set clear goals, test thoroughly, protect ideas, build diverse teams, and partner with industry.
Cristina Oldani   +4 more
wiley   +1 more source

A Novel Secret Sharing Method Based on Binary Sequence

open access: yesDianxin kexue, 2015
A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not ...
Yexia Cheng   +5 more
doaj   +2 more sources

Structural Mechanism of an Efficacy Photoswitch Targeting the β2‐adrenergic Receptor

open access: yesAngewandte Chemie International Edition, EarlyView.
Time‐resolved structures from x‐ray free‐electron laser measurements combined with cellular assays demonstrate how the photoswitchable β‐blocker photoazolol‐1 acts as an efficacy switch of β2‐adrenergic receptor function. Light‐induced ligand repositioning shifts activity from inverse agonism toward neutral antagonism by altering local helical ...
Robin Stipp   +29 more
wiley   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Technobiological Pathways for High‐CO₂ Capture Using Micro‐/Macroalgae: Genetic Engineering, Process Automation, and Value‐Added Bioproducts

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Greenhouse gas (GHG) emissions have emerged as one of the most critical drivers of climate change; this is primarily due to high concentrations and long atmospheric life of carbon dioxide (CO2). For a significant amount of time, various biological processes such as microalgal cultivation, cyanobacterial systems, photosynthetic microorganisms ...
Sadhana Semwal, Harish Chandra Joshi
wiley   +1 more source

Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure

open access: yesJournal of Mathematical Cryptology, 2013
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P.   +1 more
doaj   +1 more source

Some Multisecret-Sharing Schemes over Finite Fields

open access: yesMathematics, 2020
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj   +1 more source

Revisiting paravertebral muscles in European rabbits (Oryctolagus cuniculus) and European brown hares (Lepus europaeus) (Leporidae; Lagomorpha)

open access: yesThe Anatomical Record, EarlyView.
Abstract Domesticated European rabbits (Oryctolagus cuniculus) have long been chosen as laboratory model organisms. Despite this, there has been no definitive study of the vertebral musculature of wild rabbits. Relevant descriptions of well‐studied veterinary model mammals (such as dogs) are generally applicable, but not appropriate for a species ...
Nuttakorn Taewcharoen   +3 more
wiley   +1 more source

Fair Verifiable Secret Sharing Driven by Smart Contracts [PDF]

open access: yesJisuanji gongcheng
Unfair issues arise in secret sharing owing to the insufficient consideration given to participants′self-interested behaviors, such as honest participants being unable to reconstruct the shared secret while dishonest participants are able to.
ZHANG Qianhui, YUAN Lingyun, XIE Tianyu, WU Jiaying
doaj   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Home - About - Disclaimer - Privacy