Results 71 to 80 of about 114,269 (316)
Digital Health in Physicians' and Pharmacists' Office: A Comparative Study of e-Prescription Systems' Architecture and Digital Security in Eight Countries. [PDF]
Aldughayfiq B, Sampalli S.
europepmc +1 more source
From digital audiobook to secure digital multimedia-book
Portable devices and wireless connections are creating a new scenario in which digital information is entering our lives in a massive way. In this article we consider MP3 audiobook applications and propose an approach to completely restyle the applications to the current mobile and multimedia scenario.
L. Egidi, FURINI, Marco
openaire +1 more source
In Situ Study of Resistive Switching in a Nitride‐Based Memristive Device
In situ TEM biasing experiment demonstrates the volatile I‐V characteristic of MIM lamella device. In situ STEM‐EELS Ti L2/L3 ratio maps provide direct evidence of the oxygen vacancies migrations under positive/negative electrical bias, which is critical for revealing the RS mechanism for the MIM lamella device.
Di Zhang +19 more
wiley +1 more source
SECURITY TECHNIQUE BASED ON WATERMARKING AND CHAOTIC ENCRYPTION FOR DIGITAL IMAGE
Faten H. Mohammed Sediq Al-Kadei
openalex +2 more sources
Charge‐Induced Morphing Gels for Bioinspired Actuation
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu +4 more
wiley +1 more source
Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif +3 more
doaj +1 more source
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large amount of random numbers, which can result in a ...
Kostas Papagiannopoulos
doaj +1 more source
This article talks about digital economy and digitalization of economic security and improvement of its management system. In addition, we will consider the state of the digital economy in the countries of the world, together with the reforms being carried out in this regard, and the views of our country in this regard.
openaire +1 more source
Stable ion‐exchange doping of organic semiconductor single crystals is demonstrated using bulky hydrophobic anions. Electrical conductivity is significantly enhanced and maintained under ambient air and elevated temperatures, while intrinsic strain sensitivity remains intact over 100 000 strain cycles. The approach highlights the critical role of anion
Tomohiro Murata +5 more
wiley +1 more source
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee +2 more
doaj +1 more source

