Results 211 to 220 of about 31,297 (287)
Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis +1 more
wiley +1 more source
Cyber-attack risk low for medical devices. [PDF]
Tse ZT, Xu S, Fung IC, Wood BJ.
europepmc +1 more source
ABSTRACT Users of child protection social work and/or their families are fully entitled to express their dissatisfaction with the professional or service through both formal and informal channels. Fair criticism and dissatisfaction can sometimes, however, escalate and cross the line into violence, harassment and abuse (VHA).
Amy Bradley +3 more
wiley +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat +5 more
wiley +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
This review evaluates advanced intelligent fault diagnosis and resilient fault‐tolerant control strategies for modular multilevel converters (MMCs). It highlights how integrating machine learning with robust control architectures enhances reliability and operational continuity, providing a roadmap for developing more resilient, self‐healing power ...
Muhammad Haris Saleem +3 more
wiley +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj +9 more
wiley +1 more source

