Results 231 to 240 of about 4,934,720 (371)
Framework for generating expert systems to perform computer security risk analysis
S.T. Smith, J.J. Lim
openalex +1 more source
Improving Control System Security through the Evaluation of Current Trends in Computer Security Research [PDF]
Rolston
openalex +1 more source
This study presents a custom‐made soft pneumatic device (SPD) that mimics complex mechanical forces and fluid flow to enhance in vitro cell differentiation. It shows that low mechanotransduction promotes MSC differentiation into osteoprogenitor cells, while high mechanotransduction causes structural disruptions and cell detachment, providing new ...
Gwang‐Bum Im+9 more
wiley +1 more source
Certified randomness using a trapped-ion quantum processor. [PDF]
Liu M+31 more
europepmc +1 more source
In this study, a cuff‐free, less‐invasive surgical approach for vagus nerve stimulation (VNS) by combining ultrathin Y‐shaped kirigami electrodes is developed with a chemically cross‐linked hydrogel adhesive (hydrogel‐kirigami). Unlike conventional cuff implantation, which may damage nerves and nearby critical vessels, this new technique minimizes ...
Jae Young Park+9 more
wiley +1 more source
Enhancing IoT security with a DNA-based lightweight cryptography system. [PDF]
Aqeel S+4 more
europepmc +1 more source
A Validation of a Computer-Assisted Randomized Response Survey to Estimate the Prevalence of Fraud in Social Security [PDF]
Gerty Lensvelt‐Mulders+3 more
openalex +1 more source
Engineering the Future of Restorative Clinical Peripheral Nerve Surgery
What if damaged nerves could regenerate more effectively? This review unveils cutting‐edge strategies to restore nerve function, from biomaterial scaffolds and bioactive molecules to living engineered tissues. By accelerating axonal regrowth, preserving Schwann cells, and enhancing connectivity, these approaches are reshaping nerve repair—offering new ...
Justin C. Burrell+5 more
wiley +1 more source
Hardware Acceleration-Based Privacy-Aware Authentication Scheme for Internet of Vehicles Using Physical Unclonable Function. [PDF]
Madububa Mbachu U+6 more
europepmc +1 more source
An artificial immune system architecture for computer security applications
Paul K. Harmer+3 more
openalex +1 more source