Results 51 to 60 of about 5,430 (195)
Intumescent paints Patent [PDF]
Nitroaniline sulfate, intumescent ...
Fohlen, G. M., Parker, J. A.
core +1 more source
Detaillierte Analyse der Bindepräferenz von Roquin an RNA‐Stammschleifen
sRBNS (strukturiertes RNA Bind‐n‐Seq) ermöglicht die präzise Kartierung von RNA‐Protein‐Interaktionen inklusive RNA‐Strukturen auf Nukleotidebene. Mit dieser neuen Methode haben wir die RNA‐Bindepräferenzen von Roquin‐Proteinen gegenüber RNA‐Stammschleifen untersucht, neue hochaffine Motive identifiziert und den mRNA‐Targetraum in Zellen erweitert ...
Lasse Oberstrass +7 more
wiley +1 more source
AC logic flip-flop circuits Patent [PDF]
Bistable multivibrator circuits operating at high speed and low power ...
Winkler, T.
core +1 more source
Faster amortized bootstrapping using the incomplete NTT for free
Amortized bootstrapping techniques have been proposed for FHEW/TFHE to efficiently refresh multiple ciphertexts simultaneously within a polynomial modulus.
Thales B. Paiva +4 more
doaj +1 more source
Weed Detection in Wheat Crops Using Image Analysis and Artificial Intelligence (AI)
In the present study, we used device visualization in tandem with deep learning to detect weeds in the wheat crop system in actual time. We selected the PMAS Arid Agriculture University research farm and wheat crop fields in diverse weather environments ...
Syed Ijaz Ul Haq +2 more
doaj +1 more source
Further Improvements in AES Execution over TFHE
Making the most of TFHE advanced capabilities such as programmable or circuit bootstrapping and their generalizations for manipulating data larger than the native plaintext domain of the scheme is a very active line of research. In this context, AES is a particularly interesting benchmark, as an example of a nontrivial algorithm which has eluded ...
Sonia Belaïd +5 more
openaire +1 more source
An Examination of Multi-Key Fully Homomorphic Encryption and Its Applications
With the rapid development of the Internet of Things (IoT) technology, the security problems it faces are increasingly prominent and have attracted much attention in industry and the academy.
Minghao Yuan +5 more
doaj +1 more source
Homomorphic Encryption for Confidential Statistical Computation: Feasibility and Challenges
Statistical confidentiality focuses on protecting data to preserve its analytical value while preventing identity exposure, ensuring privacy and security in any system handling sensitive information.
Yesem Kurt Peker, Rahul Raj
doaj +1 more source
Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs) are complementing approaches that can both secure computa-tions running remotely on a public cloud.
Lars Brenna +3 more
doaj +1 more source
The Individual Evolutionary Learning (IEL) model explains human subjects’ behavior in a wide range of repeated games which have unique Nash equilibria. Using a variation of ‘better response’ strategies, IEL agents quickly learn to play Nash equilibrium ...
Arifovic, Jasmina, Ledyard, John O.
core +1 more source

