Results 71 to 80 of about 153,790 (328)

Accelerating Primary Screening of USP8 Inhibitors from Drug Repurposing Databases with Tree‐Based Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng   +4 more
wiley   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding [PDF]

open access: yes, 2010
We propose a secure scheme for wireless network coding, called the algebraic watchdog. By enabling nodes to detect malicious behaviors probabilistically and use overheard messages to police their downstream neighbors locally, the algebraic watchdog ...
Barros, Joao, Kim, MinJi, Medard, Muriel
core   +2 more sources

Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect.
Muhammad Asghar Nazal   +2 more
doaj   +1 more source

Hashing technique based on SHA-3 using chaotic maps1

open access: yesInformatika, 2020
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

BlockChain: A distributed solution to automotive security and privacy

open access: yes, 2017
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali   +3 more
core   +1 more source

Accelerating Multiparametric Quantitative MRI Using Self‐Supervised Scan‐Specific Implicit Neural Representation With Model Reinforcement

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose To develop a self‐supervised scan‐specific deep learning framework for reconstructing accelerated multiparametric quantitative MRI (qMRI). Methods We propose REFINE‐MORE (REference‐Free Implicit NEural representation with MOdel REinforcement), combining an implicit neural representation (INR) architecture with a model reinforcement ...
Ruimin Feng   +3 more
wiley   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, EarlyView.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy