Results 61 to 70 of about 38,899 (287)
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang +3 more
doaj +1 more source
Nanosecond pulse laser texturing yields superhydrophobic and superhydrophilic AA2024 surfaces. Salt‐spray tests show that periodic superhydrophobic patterns suppress pitting, whereas superhydrophilic textures enhance it, linking laser‐induced morphology, wettability, and oxide chemistry to corrosion resistance.
Lis Geraldine Zschach +8 more
wiley +1 more source
We used multiple analytical techniques at the Psiché beamline, Synchrotron Soleil, and at D20 instrument in Institut Laue Langevin, to study the densification of thiophosphate solid electrolytes Li3PS4 and Li6PS5Cl. Our combined X‐ray diffraction, absorption tomography, absorption density, neutron power diffraction, and ionic conductivity analyses ...
Oskar Thompson +11 more
wiley +1 more source
The nanostructure, size, and function of mRNA‐loaded lipid nanoparticles are evaluated before drying, within polymer microneedles, and after rehydration. The results reveal the polymer and LNP loadings required to recover nanostructure and preserve the delivery performance in dry‐state formulations.
Brendan P. Dyett +19 more
wiley +1 more source
Analysis of OAuth 2.0 Vulnerabilities Arising from Weak Implementation Choices [PDF]
This project showcases authentication and authorization frameworks, such as OAuth 2.0 and OpenID Connect, by implementing a simplified OAuth 2.0 system.
Leo Petrović
doaj +1 more source
SOLUSI BISNIS BERBASIS AJAX : STUDI KASUS SISTEM POS (POINT OF SALE) [PDF]
Retailers find themselves up against fierce competition. They must fight for every sale, and work hard to build customer loyalty and protect already slim margins.
Kuswono, Dodi, Satriyanto, Edi
core
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources
We describe a microfluidic tumor‐stroma co‐culture model, engineered to resist collagen‐hydrogel contraction driven by fibroblast activity. Surface silanization with APTES covalently anchors the matrix to the chip, while Genipin crosslinking progressively increases stiffness and elasticity without harming cells. This supports >10 days of co‐culture and
Doriane Le Manach +4 more
wiley +1 more source
DISADVANTAGES PRESENTED BY HTML INLINE FRAMES IN INTEGRATION OF 3rd PARTY CONTENT [PDF]
As new virtual structures emerge, new applications, new widgets, new services become available to embed in websites. One of the preferred solutions for embedding 3rd party content is the HTML Inline Frame or iFrame.
Joița Alin-Cristian
core
Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza +4 more
core

