Results 191 to 200 of about 3,446,779 (376)
Research on the Security Protection Mechanism of Computer File Management Information System [PDF]
Bowei Li
openalex +1 more source
Biological and Mechanical Limitations for Chronic Fast‐Scan Cyclic Voltammetry Sensor Design
Real‐time detection of neurochemicals has demonstrated value in the field of neuroscience. However, current methods have limitations for use in the chronic setting, which is often the ideal environment for research. This article discusses these limitations, as well as technologies that have been developed to overcome them, and provides recommendations ...
Mason L. Perillo+6 more
wiley +1 more source
Model of enterprise's information security management [PDF]
Tatiana Omelchenko+3 more
openalex +1 more source
A wireless bioelectronic ion pump platform is developed for controlled fluoxetine delivery for wound healing in a large mammal model. Over 3 days, treated wounds showed 37% greater re‐epithelialization and a 33% lower ratio of pro‐inflammatory to reparative macrophages.
Houpu Li+25 more
wiley +1 more source
Magnetic Steganography Based on Wide‐Field Diamond Quantum Microscopy
This document illustrates magnetic steganography. Magnetic graphics, including pixel art and QR codes, are produced using magnetic materials (such as Ni) and obscure behind patterns manufactured using non‐magnetic materials (such as Au), which are unveiled through widefield quantum microscopy. Furthermore, manipulating the electron spin of NV with dual
Jungbae Yoon+7 more
wiley +1 more source
A Comparison between Business Process Management and Information Security Management [PDF]
Gaute Wangen, Einar Arthur Snekkenes
doaj +1 more source
Humanitarian management of drought needs better water security data. [PDF]
Veness WA+3 more
europepmc +1 more source
Photonic resonances within a dielectric metasurface are investigated using photoelectron emission microscopy (PEEM) and finite‐difference time‐domain simulations. An electron inelastic mean free path of 35 ± 10 nm is extracted from comparisons between microscopy and simulations.
Andrew R. Kim+9 more
wiley +1 more source
Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs [PDF]
Ari Kurnianto+2 more
openalex +1 more source
Optical wireless communications (OWCs) provide a promising alternative to spectrum‐congested microwave wireless communications. Recently, the use of metasurfaces with sub‐wavelength features for dynamic beam steering, beam manipulation, and spatial or optical‐angular‐momentum mode generation, conversion, and multiplexing in OWCs is proposed and ...
Ke Wang+7 more
wiley +1 more source