Results 61 to 70 of about 2,067,027 (330)

Current Trends and Future Perspective for Cold Spray Metal‐Ceramic Composites

open access: yesAdvanced Engineering Materials, EarlyView.
The use of cold spray (CS) technology for creating cermet deposits, combining ceramic and metallic components, is advancing rapidly. Cermets offer excellent temperature handling and erosion resistance for diverse applications. This review outlines the current state of the art, focusing on the deposition dynamics and strategies to optimize the ...
Romario A. Wicaksono   +2 more
wiley   +1 more source

Information Security Intelligence as a Basis for Modern Information Security Management

open access: yesБезопасность информационных технологий, 2013
There is a transfer from the simple Log Management Systems and SIEM systems to those supporting Information Security Intelligence (ISI). ISIe as Business Intelligence enables companies to make more informed business decisions through more effective ...
Natalia Georgievna Miloslavskaya   +1 more
doaj  

Low‐Velocity Penetration Impact Behavior of Triply Periodic Minimal Surface Strut‐Based Lattices

open access: yesAdvanced Engineering Materials, EarlyView.
Triply periodic minimal surface (TPMS)‐based lattices are gaining attention for their multifunctional properties in applications as aeronautics and automotive, which involve low‐velocity impact loading. This work evaluates the low‐velocity penetration impact behavior of five distinct TPMS architectures.
Lucía Doyle   +2 more
wiley   +1 more source

The nutritional content required to design an educational application for infertile women

open access: yesBMC Women's Health, 2023
Background Infertility has been considered as a critical health problem for couples and society. Given the worldwide exponential rise of infertility, mobile phone-based applications are drastic ways to deliver nutrition educational content to women with ...
Mostafa Langarizadeh   +3 more
doaj   +1 more source

An Empirical Study of Information Security Management Success Factors

open access: yes, 2016
Information security management (ISM) is a continuous, structured and systematic security approach to manage and protect the organisation’s information from being compromised by irresponsible parties.
Mazlina Zammani, R. Razali
semanticscholar   +1 more source

Biomimetic Design of Biocompatible Neural Probes for Deep Brain Signal Monitoring and Stimulation: Super Static Interface for Immune Response‐Enhanced Contact

open access: yesAdvanced Functional Materials, EarlyView.
Ultrathin, flexible neural probes are developed with an innovative, biomimetic design incorporating brain tissue‐compatible materials. The material system employs biomolecule‐based encapsulation agents to mitigate inflammatory responses, as demonstrated through comprehensive in vitro and in vivo studies.
Jeonghwa Jeong   +7 more
wiley   +1 more source

SDN-AAA: Towards the standard management of AAA infrastructures [PDF]

open access: yesarXiv, 2023
Software Defined Networking (SDN) is a widely deployed technology enabling the agile and flexible management of networks and services. This paradigm represents an appropriate candidate to address the dynamic and secure management of large and complex Authentication, Authorization and Accounting (AAA) infrastructures. In those infrastructures, there are
arxiv  

Ultra‐Fast Non‐Volatile Resistive Switching Devices with Over 512 Distinct and Stable Levels for Memory and Neuromorphic Computing

open access: yesAdvanced Functional Materials, EarlyView.
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao   +17 more
wiley   +1 more source

Calculation of risks of information security of telecommunication enterprise

open access: yesОткрытое образование (Москва), 2018
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko   +3 more
doaj   +1 more source

Semantic Matching of Security Policies to Support Security Experts [PDF]

open access: yesarXiv, 2013
Management of security policies has become increasingly difficult given the number of domains to manage, taken into consideration their extent and their complexity. Security experts has to deal with a variety of frameworks and specification languages used in different domains that may belong to any Cloud Computing or Distributed Systems. This wealth of
arxiv  

Home - About - Disclaimer - Privacy