Results 231 to 240 of about 3,264,256 (293)

Flexible Dielectric Acoustic Resonator Patch for Tissue Regeneration

open access: yesAdvanced Materials, EarlyView.
A flexible dielectric acoustic resonator patch enables MHz‐range ultrasound generation through resonance amplification without using piezoelectric materials. Conformal integration on a curved substrate allows efficient acoustic delivery to tissue‐mimicking environments.
Donyoung Kang   +7 more
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Soft Ionic and Electronic Triboelectric Nanogenerators: Toward Attachable and Implantable Biomedical Applications

open access: yesAdvanced Materials, EarlyView.
This review provides an overview of triboelectric nanogenerator (TENG)–based biomedical applications by classifying studies into electronic and ionic systems across attachable and implantable platforms. It summarizes key material choices, device structures, and working mechanisms that characterize current TENG‐based research, and outlines six future ...
Kyongtae Choi   +12 more
wiley   +1 more source

Elastomeric Micro‐Balloons for Remote Control of Cerebral Blood Flow and Real‐Time In vivo Imaging of Rodent Brain Response to Hypoperfusion

open access: yesAdvanced Materials, EarlyView.
This study reports the fabrication of MRI‐compatible elastomeric micro‐balloons via a multi‐step bubble casting process, where the monolithic elastomeric wall is selectively stiffened for reversible and controlled inflation and elasticity, depending on the target vessels for graded occlusion of cerebral arteries.
Jong Bin Kim   +10 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Data Security

ACM Computing Surveys, 1979
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire   +2 more sources

Data-centric security: Integrating data privacy and data security

IBM Journal of Research and Development, 2009
Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
S. D. Hennessy   +4 more
openaire   +1 more source

Data Security

Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire   +2 more sources

Data security

Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire   +2 more sources

Data security

Data & Knowledge Engineering, 1998
Summary: Maintaining data quality is an important requirement in any organization. It requires measures for access control, semantic integrity, fault tolerance and recovery. Access control regulates the access to the system by users to ensure that all accesses are authorized according to some specified policy.
openaire   +2 more sources

Home - About - Disclaimer - Privacy