Results 41 to 50 of about 464,365 (270)

Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]

open access: yes, 2018
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core  

A systematic literature review of cloud computing in eHealth

open access: yes, 2014
Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers.
Bai, Guohua, Hu, Yan
core   +2 more sources

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

Chemically Doped Conductive Polymers for Wearable Health Monitoring

open access: yesAdvanced Materials Technologies, EarlyView.
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo   +5 more
wiley   +1 more source

Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook

open access: yesAdvanced Materials Technologies, EarlyView.
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi   +12 more
wiley   +1 more source

Analysis and Practice of Cloud Computing Information Security

open access: yesDianxin kexue, 2013
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong   +3 more
doaj   +2 more sources

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Multitasking Smart Intestinal Capsule Robot: A Cutting‐Edge Platform for Sampling, Diagnosis, and Therapy

open access: yesAdvanced Robotics Research, EarlyView.
Gut microbiota and biomarkers are linked to diseases like neurological disorders and metabolic syndromes. Ingestible capsule robots enable minimally invasive gut health assessment. This article proposes a promising direction for the advancement of capsule robots, integrating in situ sampling, real‐time diagnostics, and personalized therapy.
Xizong Chen   +3 more
wiley   +1 more source

Research on Security Enhancement Algorithm in Cloud System [PDF]

open access: yesJisuanji gongcheng, 2019
The current security protection of cloud system is mainly carried out in a single aspect.It is difficult to achieve comprehensive security protection and it lacks the ability to evaluate the security of cloud system.Therefore,a security enhancement ...
ZHANG Wei, WANG Yihuai
doaj   +1 more source

Home - About - Disclaimer - Privacy