Results 71 to 80 of about 3,048 (208)

Efficient and scalable architecture for searchable symmetric encryption

open access: yesTongxin xuebao, 2017
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext
Zhi-qiang WU, Ken-li LI, Hui ZHENG
doaj   +2 more sources

Information Transmission Strategies for Self‐Organized Robotic Aggregation

open access: yesAdvanced Robotics Research, EarlyView.
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng   +5 more
wiley   +1 more source

Collision‐Resilient Winged Drones Enabled by Tensegrity Structures

open access: yesAdvanced Robotics Research, EarlyView.
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui   +5 more
wiley   +1 more source

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

open access: yesFuture Internet, 2016
Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the ...
Mikhail Strizhov   +2 more
doaj   +1 more source

QBP1 Peptide as a Potential Anti‐Amyloidogenic Therapy for Type 2 Diabetes: An In Vitro Study

open access: yesAdvanced Science, EarlyView.
The anti‐amyloidogenic peptide QBP1 effectively halts human islet amyloid polypeptide (hIAPP) aggregation, preventing the formation of toxic β‐structured intermediates. Through a combination of biophysical assays, molecular dynamics, and cell‐based studies, QBP1 is shown to preserve β‐cell viability and metabolic homeostasis, positioning it as a ...
María M. Tejero‐Ojeda   +8 more
wiley   +1 more source

Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing

open access: yesIEEE Access
Searchable encryption, also known as secure search, is a technology that enables search operations on encrypted data while maintaining confidentiality.
Ahmad Akmal Aminuddin Mohd Kamal   +2 more
doaj   +1 more source

AutomataGPT: Transformer‐Based Forecasting and Ruleset Inference for Two‐Dimensional Cellular Automata

open access: yesAdvanced Science, EarlyView.
We introduce AutomataGPT, a generative pretrained transformer (GPT) trained on synthetic spatiotemporal data from 2D cellular automata to learn symbolic rules. Demonstrating strong performance on both forward and inverse tasks, AutomataGPT establishes a scalable, domain‐agnostic framework for interpretable modeling, paving the way for future ...
Jaime A. Berkovich   +2 more
wiley   +1 more source

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

open access: yes, 2019
Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD).
Abedin, Zain Ul   +5 more
core   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

Less leakage and more precise: Efficient wildcard keyword search over encrypted data

open access: yesHigh-Confidence Computing
Wildcard searchable encryption allows the server to efficiently perform wildcard-based keyword searches over encrypted data while maintaining data privacy.
Yunling Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy