Results 81 to 90 of about 241,235 (288)
Development of Teleoperated Robotic System for Remote Intraocular Microsurgery
A teleoperated robotic system, characterized by micrometer‐scale precision and a remote center of motion design, is developed and validated to ensure the safety and flexibility of remote intraocular surgery. This system exhibits superior performance in experimental evaluations and holds significant potential for advancing remote microsurgery ...
Andi Xu +30 more
wiley +1 more source
Cloud Computing Security: A Survey
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing
Issa M. Khalil +2 more
doaj +1 more source
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
Cinnamic‐hydroxamic‐acid derivatives (CHADs) are identified as novel inhibitors of the bacterial nucleoid‐associated protein HU, exhibiting potent antibacterial, anti‐biofilm (both inhibition and eradication), and DNA relaxation (anti‐supercoiling) activities. Moreover, CHADs demonstrate strong synergistic effects with multiple antibiotics.
Huan Chen +22 more
wiley +1 more source
Partly Cloudy, Scattered Clients: Cloud Implementation in the Federal Government [PDF]
Since the issuance of a federal mandate in 2010 requiring federal government agencies in the United States of America to immediately shift to a “Cloud First” policy, agencies have struggled to adopt cloud computing.
Steele, Elston +3 more
core +1 more source
This study presents a novel microscopic imaging system capable of rapid, section‐free scanning of irregular tissue surfaces, delivering high sensitivity for detecting cancer cell clusters during intraoperative tumor margin assessment. Abstract Rapid and accurate intraoperative examination of tumor margins is crucial for precise surgical treatment, yet ...
Zhicheng Shao +17 more
wiley +1 more source
SURVEY ON CLOUD COMPUTING VULNERABILITY AND CYBER ATTACKS: A DEFENSIVE APPROACH
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing.
YUCEL TUREL
doaj
Assessing database and network threats in traditional and cloud computing [PDF]
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina +2 more
core
Comment on “De Novo Reconstruction of 3D Human Facial Images from DNA Sequence”
This comment examines AI‐driven DNA‐based facial reconstruction, focusing on the Difface model. While such technologies promise biomedical and forensic applications, they pose significant ethical, legal, and methodological challenges. We emphasize transparency, benchmarking, and rigorous validation to avoid misinterpretation and misuse.
Jennifer K. Wagner +3 more
wiley +1 more source

