Results 71 to 80 of about 77,587 (303)

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

Bioprinting Organs—Science or Fiction?—A Review From Students to Students

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu   +18 more
wiley   +1 more source

A multi-step hybrid forecasting model based on optimized secondary decomposition and TCN-BiLSTM with residual learning

open access: yesDiscover Computing
Accurate air quality forecasting is crucial for ecological environmental protection and public health early warning. To address the non-stationarity and noise inherent in AQI series, this study proposes a novel hybrid forecasting framework.
Zhaoqian Zhang   +4 more
doaj   +1 more source

Empowering protest through social media [PDF]

open access: yes, 2011
Advances in personal communications devices including smartphones, are enabling individuals to establish and form virtual communities in cyberspace. Such platforms now allow users to be in continuous contact, enabling them to receive information in real ...
O\u27Rourke, Simon
core   +1 more source

Precise Control of Drug Release in Machine Learning‐Designed Antibody‐Eluting Implants for Postoperative Scarring Inhibition in Glaucoma

open access: yesAdvanced Healthcare Materials, EarlyView.
We developed a micro‐sized, biocompatible implant for postoperative sustained delivery of anti‐fibrotic antibodies in glaucoma surgery. Machine learning‐guided optimization of polymer composition, implant geometry, and porosity enabled precise control of drug release.
Mengqi Qin   +5 more
wiley   +1 more source

Cyberterrorism: the story so far [PDF]

open access: yes, 2003
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same.
Conway, Maura
core  

Ti6Al4V‐Bioglass‐Copper Composites for Load‐Bearing Implants

open access: yesAdvanced Healthcare Materials, EarlyView.
We have designed and manufactured a novel Ti64‐based composite by adding 45S5 bioglass (BG) and copper (Cu). Adding BG on titanium improves wear resistance and biocompatibility, whereas Cu addition improves mechanical strength while providing inherent lifelong bacterial resistance.
Lochan Upadhayay   +3 more
wiley   +1 more source

Key-Value Mapping-Based Text-to-Image Diffusion Model Backdoor Attacks

open access: yesAlgorithms
Text-to-image (T2I) generation, a core component of generative artificial intelligence(AI), is increasingly important for creative industries and human–computer interaction.
Lujia Chai   +3 more
doaj   +1 more source

Tunable Bioresorbable Scaffolds With Marine Sulfated Polysaccharides for Small‐Caliber Vascular Grafts: A Multi‐Layered Strategy Combining Electrospinning and 4‐Axis Printing

open access: yesAdvanced Healthcare Materials, EarlyView.
A multilayered small‐caliber vascular scaffold combining electrospinning and 4‐axis printing is developed and biofunctionalized with marine sulfated polysaccharides from Holothuria tubulosa. The resulting construct exhibits enhanced hemocompatibility, tunable mechanical properties, and supports endothelial and smooth muscle cell adhesion and ...
Gabriele Obino   +9 more
wiley   +1 more source

A fine-grained bilateral access control scheme under policy and attribute hiding for cloud-fog-assisted IoT

open access: yesJournal of King Saud University: Computer and Information Sciences
Cloud-fog computing-based Internet of Things (IoT) applications can store and analyze numerous data resources, but they also face security risks such as untrustworthy cloud servers and unauthorized data access.
Kejun Zhang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy