Results 61 to 70 of about 11,934 (254)

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment

open access: yesBMEMat, EarlyView.
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan   +8 more
wiley   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Classifying avian drinking behaviour: ecological insights and implications in a changing world

open access: yesBiological Reviews, EarlyView.
ABSTRACT Water is a fundamental currency of life, and its availability significantly influences animal behaviour, physiology and distributions. However, our knowledge around the dependence on water for drinking and the direct and indirect mechanisms driving related behaviours remains partial in the context of changing climates. Here, we review patterns
Shannon R. Conradie, Marc T. Freeman
wiley   +1 more source

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

Generalized quantum secret sharing

open access: yesPhysical Review A, 2005
To appear in Phys. Rev.
Singh, Sudhir Kumar, Srikanth, R.
openaire   +2 more sources

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

A novel meaningful secret image sharing method based on Arabic letters

open access: yesKuwait Journal of Science, 2016
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators.
Derya Avci
doaj  

Innovating for Net‐Zero: Collaborative and Digital Decarbonisation Strategies in Sunset Industries' Global Value Chains

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Global net‐zero ambitions require transformative strategies to decarbonise carbon‐intensive global value chains (GVCs). This study examines how multinational enterprises (MNEs) in sunset industries integrate carbon capture technologies (CCT) with operational and supply chain dynamics (OSCD) to advance decarbonisation.
Muhammad Mustafa Kamal   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy