Results 111 to 120 of about 3,479,617 (281)
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Fuzzing is a popular and effective software testing technique that automatically generates or modifies inputs to test the stability and vulnerabilities of a software system, which has been widely applied and improved by security researchers and experts ...
Van-Hau Pham +4 more
doaj +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source
Here, we present a high‐density PEDOT eutectogel electrode array for enhanced body surface gastric mapping. Silver electrodes are blade‐coated onto flexible substrates, followed by electrogelation of PEDOT:PSS and the deposition of a PEDOT:LS eutectogel.
Christopher Slaughter +8 more
wiley +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang +8 more
doaj +1 more source
A Hybrid Multi-Scale Transformer-CNN UNet for Crowd Counting
Crowd counting is a critical computer vision task with significant applications in public security and smart city systems. While deep learning has markedly improved accuracy, persistent challenges include extreme scale variations, severe occlusion, and ...
Kai Zhao +3 more
doaj +1 more source
Digital Actuation Control of Soft Robotic Origami With Self‐Folding Liquid Crystal Elastomer Hinges
Self‐folding soft‐rigid hybrid robotic origami is enabled by liquid crystal elastomer actuators with embedded Joule heating and closed‐loop digital control. Digitally addressable hinges provide reversible and programmable transitions between distinct folded states while maintaining actuation performance at high cycle counts (over 1500).
David C. Bershadsky +3 more
wiley +1 more source

