Results 21 to 30 of about 3,112 (196)
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Weighted Threshold Secret Image Sharing [PDF]
Given a secret image I, a threshold r, and a set of n ( ≥ r) participants P = {1, 2, ... , n} with a set of weights W = {w 1, w 2, ... , w n } where w i is the weight (which indicates the degree/rank of importance) of participant i and we assume that w 1 ≤ w 2 ≤ ... w n . The idea of weighted threshold secret image sharing encodes I into n shadows S 1,
Shyong Jian Shyu +3 more
openaire +1 more source
Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan +8 more
wiley +1 more source
Classifying avian drinking behaviour: ecological insights and implications in a changing world
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley +1 more source
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Lossless Secret Image Sharing Schemes
Secret image sharing deals with splitting confidential images into several shares and the original image can be reconstructed from the qualified subset of the shares. Secret sharing schemes are used in transmission and storage of private medical images and military secrets. Increased confidentiality and availability are the major achievements.
Binu, V. P., Sreekumar, A.
openaire +2 more sources
Abstract Hydrogen plays a crucial role across multiple industrial sectors and is increasingly recognized as a clean energy carrier with significant potential in decarbonization efforts. Methane pyrolysis (MP), particularly using molten metal catalysts, offers a promising pathway for hydrogen production with low CO2 emissions.
Adrian Paredes Bozzo, Zukui Li
wiley +1 more source
Secret Sharing using Image Hashing
paper presents a cryptographic technique that encrypts secret information using a coding image by transforming the pixels of this image from the intensity domain to the characters domain using a hash function. In the proposed technique, the coding image will be used to encrypt the secret information at the sender and decrypt it at the receiver using ...
openaire +1 more source

