Results 111 to 120 of about 2,381,348 (304)
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
Can Ti‐Based MXenes Serve as Solid Lubricants for Brake Applications? A Tribological Study
This study explores the first implementation of Ti‐based MXenes materials in brake pad friction composite material. The resulting composite material exhibits a 48% reduction in the wear rate; alongside significant improvements are observed for thermal and mechanical properties.
Eslam Mahmoud +7 more
wiley +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
EFFECTIVENESS ASSESSMENT METHODOLOGY OF INFORMATION SECURITY MANAGEMENT SYSTEM THROUGH THE SYSTEM RESPONSE TIME TO INFORMATION SECURITY INCIDENTS [PDF]
Quality assessment of information security management system is an important step for obtaining baseline data for analysis of the security system control effectiveness, and evaluating implementation of the specified information security requirements of
F. N. Shago
doaj
Models of Epidemiological Security Management in the Spread of the SARS-CoV-2 Virus. [PDF]
Kereselidze N.
europepmc +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Security anomaly detection for enterprise management network based on attention mechanism
With the rapid growth of data volume in enterprise management systems and the continuous complexity of network architecture, traditional network security protection methods are no longer sufficient to fully address the security challenges. In response to
Zhaohan You, Yucai Zheng
doaj +1 more source
The Role of User Behaviour in Improving Cyber Security Management. [PDF]
Moustafa AA, Bello A, Maurushat A.
europepmc +1 more source
The chemical composition and band alignment are systematically investigated at the TiO2/InP heterointerface. Thin TiO2 films are deposited by ALD on atomically ordered, P‐terminated p‐InP(100). By combining UPS, XPS, and ab initio molecular dynamics, the atomistic structure and electronic alignment are revealed.
Mohammad Amin Zare Pour +11 more
wiley +1 more source

