Irrespective of the final application of a molecule, synthetic accessibility is the rate-determining step in discovering and developing novel entities. However, synthetic complexity is challenging to quantify as a single metric, since it is a composite of several measurable metrics, some of which include cost, safety, and availability. Moreover, defining a single synthetic accessibility metric for both natural products and non-natural products poses yet another challenge given the structural distinctions between these two classes of compounds. Here, we propose a model for synthetic accessibility of all chemical compounds, inspired by the Central Limit Theorem, and devise a novel synthetic accessibility metric assessing the overall feasibility of making chemical compounds that has been fitted to a Gaussian distribution.
Read More...Browse Articles
A Retrospective Statistical Analysis of Second Primary Cancers in the Delmarva Peninsula, U.S.A.
A significant percentage of cancer survivors develop a second primary cancer. Using data of deceased patients provided by the Peninsula Regional Medical Center, Li and Holdai conducted a retrospective statistical analysis to investigate whether the type of the first cancer affects the occurrence time and type of the second primary cancer.
Read More...Deciphering correlation and causation in risk factors for heart disease with Mendelian randomization
Here, seeking to identify the risk of coronary artery disease (CAD), a major cause of cardiovascular disease, the authors used Mendelian randomization. With this method they identified several traits such as blood pressure readings, LDL cholesterol and BMI as significant risk factors. While other traits were not found to be significant risk factors.
Read More...People’s Preference to Bet on Home Teams Even When Losing is Likely
In this study, the authors investigate situations in which people make sports bets that seem to go against their better judgement. Using surveys, individuals were asked to bet on which team would win in scenarios when their home team was involved and others when they were not to determine whether fandom for a team can overshadow fans’ judgment. They found that fans bet much more on their home teams than neutral teams when their team was facing a large deficit.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...Long-run effects of minimum wage on labor market dynamics
The authors looked at potential downstream effects of raising the minimum wage. Specifically they focused on taxable wages, employment, and firm counts.
Read More...SpottingDiffusion: Using transfer learning to detect Latent Diffusion Model-synthesized images
Understanding the battleground of identity fraud
The authors looked at variables associated with identity fraud in the US. They found that national unemployment rate and online banking usage are among significant variables that explain identity fraud.
Read More...Can the attributes of an app predict its rating?
In this article the authors looked at different attributes of apps within the Google Play store to determine how those may impact the overall app rating out of five stars. They found that review count, amount of storage needed and when the app was last updated to be the most influential factors on an app's rating.
Read More...Evaluating the predicted eruption times of geysers in Yellowstone National Park
The authors compare the predicted versus actual geyser eruption times for the Old Faithful and Beehive Geysers at Yellowstone National Park.
Read More...