Results 171 to 180 of about 112,027 (304)
An efficient framework for scheduling security-critical tasks in resource-limited mobile edge computing using hybridized gold rush with golden jackal optimization strategy. [PDF]
Vhatkar K +7 more
europepmc +1 more source
Charge‐Induced Morphing Gels for Bioinspired Actuation
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu +4 more
wiley +1 more source
Enhancing healthcare outcome with scalable processing and predictive analytics via cloud healthcare API. [PDF]
Salehi SS +7 more
europepmc +1 more source
Penetration Testing as a Security Analysis of Computer Systems
А. К. Плешков, Davyd Ruder
openalex +1 more source
High‐entropy perovskite nanofibers serve as robust and active bifunctional air electrodes in reversible protonic ceramic electrochemical cells. Their compositional complexity stabilizes the lattice, enriches oxygen vacancies, and accelerates surface exchange.
Hyeonggeun Kim +4 more
wiley +1 more source
AI-embedded IoT healthcare optimization with trust-aware mobile edge computing. [PDF]
Alamri M +3 more
europepmc +1 more source
Vacuum‐based deposition is promising for perovskite solar cells to be successfully commercialized. However, co‐evaporation, the most common vapor phase deposition technique, suffers from very low deposition rates. In this work, we reveal that high deposition rates can lead to carbon flakes depositing into the perovskite absorber layers due to material ...
Thomas Feeney +13 more
wiley +1 more source
Research on network security vulnerability risk contagion in software supply chain based on system dynamics. [PDF]
Cai H, Xiong Q, Lian S.
europepmc +1 more source

