Results 121 to 130 of about 3,894,133 (310)
The role of financial security in loneliness or sadness among Medicare-enrolled cancer survivors during the COVID-19 pandemic. [PDF]
Sarkar S +3 more
europepmc +1 more source
The methodological approach to the application of anti-crisis management in the system of ensuring financial security of the enterprise, unlike the existing ones, summarizes and systematizes the theoretical and methodological features of determining the ...
O. Sylkin +4 more
semanticscholar +1 more source
Flexible Polypyrrole‐Based pH Sensors via Oxidative Chemical Vapor Deposition
Oxidative chemical vapor deposition (oCVD) of polypyrrole (PPy) thin films yields flexible, electrically conductive, and biocompatible pH sensors for monitoring on‐skin biological events. The highly sensitive, oCVD PPy skin‐conformal sensors enable real‐time, spatially resolved sensing of dynamic pH changes within physiologically relevant ranges (4–9 ...
Adrivit Mukherjee +15 more
wiley +1 more source
Tiny Security Hole: First-Order Vulnerability of Masked SEED and Its Countermeasure
Side-channel analysis is a type of cryptanalysis that utilizes the physical leakage of a cryptographic device. An adversary exploits the relationship between a physical leakage and the secret intermediate value of an encryption algorithm.
Ju-Hwan Kim, Dong-Guk Han
doaj +1 more source
COVID-19 in the Community: Changes to Women's Mental Health, Financial Security, and Physical Activity. [PDF]
Zimmerman ME +9 more
europepmc +1 more source
UCI Community Credit partners with non-profit Abrazar and PhotovoiceWorldwide to capture community stories of financial struggle, resilience in photographs at an exhibit featured at a community event.
openaire +1 more source
Potato virus X is a filamentous RNA plant virus that can be engineered into a molecular tool for cancer therapy. We produced genetically‐encoded virus‐derived nanoparticles decorated with nanobodies targeting cancer cell receptors, epidermal growth factor receptor (EGFR) and human epidermal growth factor 2 (HER2).
Enrique Lozano‐Sanchez +4 more
wiley +1 more source
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Deterministic random bit generators (DRBG) play a crucial role in device security because they generate secret information cryptographic systems, e.g., secret keys and parameters.
Jaeseung Han, Dong-Guk Han
doaj +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Strain Engineering of Magnetoresistance and Magnetic Anisotropy in CrSBr
Biaxial compressive strain significantly enhances magnetoresistance and critical saturation fields in thin flakes of the 2D magnet CrSBr, along all three crystallographic axes. First‐principles calculations link these effects to strain‐induced increases in exchange interactions and magnetic anisotropy.
Eudomar Henríquez‐Guerra +19 more
wiley +1 more source

