Results 71 to 80 of about 468,074 (268)

Advances and Perspectives in Graphene‐Based Quantum Dots Enabled Neuromorphic Devices

open access: yesAdvanced Science, EarlyView.
Graphene‐based QDs are zero‐dimensional carbon nanomaterials with pronounced quantum confinement and tunable electronic structures. Herein, we summarize their synthesis strategies and functionalization methods, and highlight their functional roles and operating mechanisms in devices, as well as recent advances in neuromorphic electronics. We anticipate
Yulin Zhen   +9 more
wiley   +1 more source

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT [PDF]

open access: yesICTACT Journal on Soft Computing, 2016
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people ...
R Poorva Devi, S Rajalakshmi
doaj  

SDS‐CRISPR for Single‐Nucleotide Variant Detection

open access: yesAdvanced Science, EarlyView.
Structure‐disruption‐sensitive CRISPR (SDS‐CRISPR) converts structural instability into single‐nucleotide precision, thereby overcoming mismatch tolerance in canonical Cas12a and enabling versatile diagnostics across DNA, RNA, and microRNA targets. When applied to rapid IDH1 mutation detection for glioma genotyping and integrated with lateral‐flow ...
Xin Guan   +12 more
wiley   +1 more source

In Situ Polymerized Composite Electrolytes for High‐Performance Solid‐State Lithium Batteries: A Review

open access: yesAdvanced Science, EarlyView.
This review systematically explores the recent advances in in situ polymerized composite polymer electrolytes (CPEs) for solid‐state lithium batteries. It covers the fundamentals of reaction mechanisms, monomer chemistry, and their impact on interfacial stability, ionic conductivity, and electrochemical performance.
Jialin Li   +9 more
wiley   +1 more source

Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure

open access: yesComputers, 2019
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burden ...
Annanda Rath   +3 more
doaj   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

Cotton Recruits Soil‐Derived Delftia tsuruhatensis to Suppress Aphid Detoxification Via Salicylic Acid‐Mediated Defense

open access: yesAdvanced Science, EarlyView.
This study systematically reveals a complex interactive network involving plants, microbes, and insects, elucidating the ecological and molecular mechanisms by which cotton enhances its resistance to aphids through the active recruitment of the beneficial soil bacterium Delftia tsuruhatensis.
Hui Xue   +11 more
wiley   +1 more source

Solution for smart government cloud based on cloud security technology

open access: yesDianxin kexue, 2017
The national Twelfth Five-year Plan have proposed to strengthen information sharing and austerity,government cloud development are planning this plan.
Qianhua ZHANG, Jianwu ZHANG
doaj   +2 more sources

Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud [PDF]

open access: yes, 2012
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources.
Aslam, Mudassar   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy