Results 61 to 70 of about 487,200 (366)

Rational Molecular Design of Aniline‐Based Donor‐Acceptor Conducting Polymers Enhancing Ionic Molecular Interaction for High‐Performance Wearable Bioelectronics

open access: yesAdvanced Healthcare Materials, EarlyView.
Organic conducting polymers are crucial for advanced wearable bioelectronic devices. A novel aniline‐based donor‐acceptor conducting polymer is developed via a rational molecular design approach, exhibiting enhanced ionic molecular interactions for highly sensitive and stable wearable pH sensors.
Junning Qian   +3 more
wiley   +1 more source

Security and Privacy Issues in Cloud Computing [PDF]

open access: yes, 2016
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009 ...
Ismail, H., Khan, M., Medvedev, M.
core  

Job Security in the Cloud Computing [PDF]

open access: yesInternational Journal of Future Computer and Communication, 2015
 Abstract—Cloud computing is a burgeoning Internet computing paradigm. The convenient, cheap and elastic resources in the cloud are attracting the users to migrate their assets (data, computing and software, etc.) into it. However, cloud also caused the serious worry about the security of those assets, since the resources are not under the control of ...
Tuo Yupeng   +3 more
openaire   +2 more sources

Robust Full‐Surface Bonding of Substrate and Electrode for Ultra‐Flexible Sensor Integration

open access: yesAdvanced Materials, EarlyView.
A direct hybrid bonding method that enables both gold and parylene bonding without adhesives is developed. This technique achieves full‐surface direct bonding of electrodes and substrates in flexible electronic connections. The method offers high flexibility, stable mechanical durability, and high‐resolution interconnections, accommodating varying ...
Masahito Takakuwa   +9 more
wiley   +1 more source

Chinese Wall Security Policy [PDF]

open access: yes, 2009
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core   +1 more source

Photonic Nanomaterials for Wearable Health Solutions

open access: yesAdvanced Materials, EarlyView.
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park   +3 more
wiley   +1 more source

MDA: message digest-based authentication for mobile cloud computing

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2016
The emerging area of mobile cloud computing will influence the future of varied applications, such as electronic commerce and health informatics. It is expected to rise in popularity over other models in cloud computing.
Saurabh Dey, Srinivas Sampalli, Qiang Ye
doaj   +1 more source

Inorganic Dielectric Materials Coupling Micro‐/Nanoarchitectures for State‐of‐the‐Art Biomechanical‐to‐Electrical Energy Conversion Devices

open access: yesAdvanced Materials, EarlyView.
Biomechanical‐to‐electrical energy conversion devices are uniquely suited for self‐driven physiological information monitoring and powering human–computer interaction systems. These devices based on micro‐/nanoarchitectured inorganic dielectric materials (MNIDMs) have shown ultrahigh electromechanical performance and thus great potential for practical ...
Jia‐Han Zhang   +12 more
wiley   +1 more source

Research on Security of Virtualization on Cloud Computing

open access: yesDianxin kexue, 2015
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang   +4 more
doaj   +2 more sources

The Refugee Problem: An International Legal Tangle [PDF]

open access: yes, 1958
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization,
Bradway, John S., Evans, Alona E.
core   +1 more source

Home - About - Disclaimer - Privacy