Results 231 to 240 of about 3,264,256 (293)
Flexible Dielectric Acoustic Resonator Patch for Tissue Regeneration
A flexible dielectric acoustic resonator patch enables MHz‐range ultrasound generation through resonance amplification without using piezoelectric materials. Conformal integration on a curved substrate allows efficient acoustic delivery to tissue‐mimicking environments.
Donyoung Kang +7 more
wiley +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
This review provides an overview of triboelectric nanogenerator (TENG)–based biomedical applications by classifying studies into electronic and ionic systems across attachable and implantable platforms. It summarizes key material choices, device structures, and working mechanisms that characterize current TENG‐based research, and outlines six future ...
Kyongtae Choi +12 more
wiley +1 more source
This study reports the fabrication of MRI‐compatible elastomeric micro‐balloons via a multi‐step bubble casting process, where the monolithic elastomeric wall is selectively stiffened for reversible and controlled inflation and elasticity, depending on the target vessels for graded occlusion of cerebral arteries.
Jong Bin Kim +10 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
ACM Computing Surveys, 1979
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire +2 more sources
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire +2 more sources
Data-centric security: Integrating data privacy and data security
IBM Journal of Research and Development, 2009Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
S. D. Hennessy +4 more
openaire +1 more source
Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire +2 more sources
Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire +2 more sources
Data & Knowledge Engineering, 1998
Summary: Maintaining data quality is an important requirement in any organization. It requires measures for access control, semantic integrity, fault tolerance and recovery. Access control regulates the access to the system by users to ensure that all accesses are authorized according to some specified policy.
openaire +2 more sources
Summary: Maintaining data quality is an important requirement in any organization. It requires measures for access control, semantic integrity, fault tolerance and recovery. Access control regulates the access to the system by users to ensure that all accesses are authorized according to some specified policy.
openaire +2 more sources

