Results 91 to 100 of about 1,362,310 (293)
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. [PDF]
Edu AS, Agoyi M, Agozie D.
europepmc +1 more source
Securing digital documents using digital watermarking
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too.
Awad Kadhim Hammoud +2 more
openaire +2 more sources
This study develops a self‐powered permeable electronic dressing (SPED) that synergistically integrates exudate management, electrical stimulation, and on‐demand drug delivery. The dressing effectively absorbs exudate while demonstrating potent antibacterial activity and accelerated tissue regeneration in diabetic mouse models, thereby promoting ...
Jiaheng Liang +12 more
wiley +1 more source
Digital Health in Physicians' and Pharmacists' Office: A Comparative Study of e-Prescription Systems' Architecture and Digital Security in Eight Countries. [PDF]
Aldughayfiq B, Sampalli S.
europepmc +1 more source
From digital audiobook to secure digital multimedia-book
Portable devices and wireless connections are creating a new scenario in which digital information is entering our lives in a massive way. In this article we consider MP3 audiobook applications and propose an approach to completely restyle the applications to the current mobile and multimedia scenario.
L. Egidi, FURINI, Marco
openaire +1 more source
Online Security in the Middle East and North Africa: A Survey of Perceptions, Knowledge, and Practice [PDF]
Digital communication has become a more perilous activity, particularly for activists, political dissidents, and independent media. The recent surge in digital activism that has helped to shape the Arab spring has been met with stiff resistance by ...
Ethan Zuckerman +4 more
core
We report a polymer‐chain insertion strategy to fabricate pore‐threaded MOF thin films with precisely tuned surface chemistry and wettability. Grafting n‐alkane chains into the pillared layer Cu2(bdc)2(dabco) MOF thin film's vertical nanochannels enhances water stability, and induces hydrophobicity and lubricant‐free, solid‐like slippery behavior ...
Angana Borbora +4 more
wiley +1 more source
We present ultrathin flexible transparent electrodes through iCVD‐enabled molecular control of 10 nm gold films on poly(dimethylaminomethylstyrene). In vivo validation demonstrated photoelectric artifact reduction vs. opaque electrodes and preservation of natural neural dynamics.
Tae Jin Mun +11 more
wiley +1 more source
Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif +3 more
doaj +1 more source
This article talks about digital economy and digitalization of economic security and improvement of its management system. In addition, we will consider the state of the digital economy in the countries of the world, together with the reforms being carried out in this regard, and the views of our country in this regard.
openaire +1 more source

