Results 71 to 80 of about 114,269 (316)

From digital audiobook to secure digital multimedia-book

open access: yesComputers in Entertainment, 2006
Portable devices and wireless connections are creating a new scenario in which digital information is entering our lives in a massive way. In this article we consider MP3 audiobook applications and propose an approach to completely restyle the applications to the current mobile and multimedia scenario.
L. Egidi, FURINI, Marco
openaire   +1 more source

In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device

open access: yesAdvanced Functional Materials, EarlyView.
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang   +19 more
wiley   +1 more source

Charge‐Induced Morphing Gels for Bioinspired Actuation

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu   +4 more
wiley   +1 more source

Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

open access: yesJournal of Information Security and Cybercrimes Research
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif   +3 more
doaj   +1 more source

Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large amount of random numbers, which can result in a ...
Kostas Papagiannopoulos
doaj   +1 more source

DIGITALIZE ECONOMIC SECURITY

open access: yes, 2022
This article talks about digital economy and digitalization of economic security and improvement of its management system. In addition, we will consider the state of the digital economy in the countries of the world, together with the reforms being carried out in this regard, and the views of our country in this regard.
openaire   +1 more source

Highly Stable Ion‐Exchange Doping of Organic Semiconductor Single Crystals for Reliable Flexible Sensors

open access: yesAdvanced Functional Materials, EarlyView.
Stable ion‐exchange doping of organic semiconductor single crystals is demonstrated using bulky hydrophobic anions. Electrical conductivity is significantly enhanced and maintained under ambient air and elevated temperatures, while intrinsic strain sensitivity remains intact over 100 000 strain cycles. The approach highlights the critical role of anion
Tomohiro Murata   +5 more
wiley   +1 more source

Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World

open access: yesIEEE Access
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy