Results 181 to 190 of about 3,165,354 (231)

Multivalent Protein Nanorings for Broad and Potent SARS‐CoV‐2 Neutralization

open access: yesAdvanced Healthcare Materials, EarlyView.
A protein‐only, modular multivalent nanoscaffold displaying 20 anchor points, decorated with two different binders (10 of each), targeting the SARS‐CoV‐2 receptor‐binding domain is presented. The construct self‐assembles into stable, biocompatible, homogeneous nanoparticles, exhibit synergistic binding with fM IC50 values. It also detects spike at 9 ng 
Molood Behbahanipour   +11 more
wiley   +1 more source

Living Materials Approach for In Situ Bio‐Polymers Production Using Bacillus Paralicheniformis in Microneedles

open access: yesAdvanced Healthcare Materials, EarlyView.
Dissolvable microneedle (MN) device containing Bacillus paralicheniformis. The polymeric matrix encapsulates and protects the bacteria, preserving their viability while enabling in situ production and release of γ‐polyglutamic acid. The bacteria are delivered into the skin via 500 µm‐long microneedles, and remain detectable on the skin 24 h post ...
Caroline Hali Alperovitz   +3 more
wiley   +1 more source

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Data-centric security: Integrating data privacy and data security

IBM Journal of Research and Development, 2009
Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
S. D. Hennessy   +4 more
openaire   +1 more source

Data Security

Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire   +2 more sources

Data security

Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire   +2 more sources

Data security

2022
Samiksha Shukla   +3 more
  +6 more sources

Data security.

HealthTexas, 1990
Abstract It almost goes without saying that information technology is central to the successful operation of much of today’s commerce, industry and, indeed, government. Most commercial organisations could hardly be expected to survive without the proper functioning of their data processing, file management, data communications and other ...
openaire   +3 more sources

Data security

Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire   +1 more source

Home - About - Disclaimer - Privacy