Results 81 to 90 of about 77,587 (303)
Underwater acoustic sensor networks have a wide range of applications in both civil and military fields, but the complex and changing underwater environment makes them vulnerable to multiple security threats.
Changtao Liu +3 more
doaj +1 more source
Efficient Incremental Learning Using Dynamic Correction Vector
One major challenge for modern artificial neural networks (ANNs) is that they typically does not handle incremental learning well. In other words, while learning the new features, the performances of existing features usually deteriorate. This phenomenon
Yun Xiang +3 more
doaj +1 more source
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
Zinc‐containing bioactive glass (ZnBG) promotes diabetic wound healing by regulating macrophage extracellular traps (METs). Specifically, ZnBG reduces oxidative stress and inhibits the PAD4 and NLRP3/caspase‐1/GSDMD signaling pathways, thereby suppressing MET formation.
RuiYang Sun +11 more
wiley +1 more source
The Path of Internet Law: An Annotated Guide to Legal Landmarks [PDF]
The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property.
D’Angelo, Diane, Rustad, Michael L.
core +1 more source
Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020 [PDF]
The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not ...
Garside, Susanna
core
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Computer cyberspace security mechanism supported by cloud computing. [PDF]
Fu Z.
europepmc +1 more source
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local ...
Meadows, Catherine, Pavlovic, Dusko
core
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source

