Results 101 to 110 of about 393,145 (302)
Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach
Ensuring multimedia content security is one of the main targets to solve multimedia information security problems and k-anonymous model is a classic and effective model to protect personal information when we publish multimedia data.
Cheng Liu +5 more
doaj +1 more source
Lessons from Iraq and Chilcot [PDF]
The UK’s Chilcot Report into the 2003 invasion of Iraq, has some essential lessons for all Ministries of Defence to take on board when it comes to ensuring troops have the equipment and support they need, before the next major military operation ...
Antill, Peter D., Ito, Pete
core
We have developed DEX/GM, an all‐natural, personalizable hybrid vaccine designed by coating dendritic cell‐derived exosomes (DEX) onto tumor cell membranes (GM) for sustained prophylaxis against glioblastoma (GBM). ABSTRACT Glioblastoma (GBM), one of the most aggressive and lethal brain tumors, remains incurable with a poor clinical prognosis.
Shanshan Li +6 more
wiley +1 more source
A NEW APPROACH TO BUILDING AND DEVELOPING DEFENSE CAPABILITY OF THE REPUBLIC OF BULGARIA [PDF]
The purpose of the article is to elaborate on the existing theory and practice about Defense Capabilities of the Republic of Bulgaria. Furthermore, by applying the systematic approach, it tries to propose a new method for building the National Defense ...
Valeri Ivanov, Ilian Sotirov
doaj
Address to the World Affairs Council [PDF]
Speech delivered to the World Affairs Council, San Francisco, July 9, 1984.https://ir.lawnet.fordham.edu/vice_presidential_campaign_speeches_1984/1029/thumbnail ...
Ferraro, Geraldine
core +1 more source
Adaptive Hydrogels With Spatiotemporal Stiffening Using pH‐Modulating Enzymes
The chemomechanical coupling in an adaptive hydrogel is studied to further the development of adaptive hydrogels. This coupling is achieved by embedding a pH‐modulating enzyme in a pH‐responsive hydrogel. The enzymatic reaction can be triggered locally, which generates a pH‐decreasing wave throughout the system, increasing the crosslinking density and ...
Natascha Gray +3 more
wiley +1 more source
Enhancing Cyber Defense Capabilities through AI Technology
The development of cyber threats is impacting vital communications infrastructure, with a focus on 5G security, AI, and international cooperation. The purpose of this study is to analyze Enhancing Cyber Defense Capabilities through AI Technology. The research method used in this study is qualitative descriptive.
Septian Dhika Aditya +2 more
openaire +1 more source
A swelling‐programmed micropatterned hydrogel guides adherent cells through a controlled transition from cell–matrix anchoring to cadherin‐mediated cell–cell compaction, enabling rapid assembly of high‐viability spheroids with defined size and morphology.
Han Gyeol Nam +8 more
wiley +1 more source
Power, Techno-economics, and Transatlantic Relations in 1987-1999 [PDF]
This essay suggests that in 1987-1999 European elites, in their efforts of asymmetric balancing against the United States hegemony, decided to trade-off military capability for economic competitiveness.
Lungu, Sorin.
core
Nanodiamond Quantum Sensors for Probing Free Radical Biology
Free radicals play key roles in cellular signaling and disease but remain difficult to measure in living systems. Nanodiamonds (NDs) with nitrogen‐vacancy (NV) centers enable quantum sensing of local magnetic noise via T₁ relaxometry, providing nondestructive radical detection in living cells.
Qi Lu, Yingke Wu, Tanja Weil
wiley +1 more source

