Results 121 to 130 of about 2,389,131 (303)
Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu +6 more
wiley +1 more source
Security anomaly detection for enterprise management network based on attention mechanism
With the rapid growth of data volume in enterprise management systems and the continuous complexity of network architecture, traditional network security protection methods are no longer sufficient to fully address the security challenges. In response to
Zhaohan You, Yucai Zheng
doaj +1 more source
Models of Epidemiological Security Management in the Spread of the SARS-CoV-2 Virus. [PDF]
Kereselidze N.
europepmc +1 more source
This study develops a self‐powered permeable electronic dressing (SPED) that synergistically integrates exudate management, electrical stimulation, and on‐demand drug delivery. The dressing effectively absorbs exudate while demonstrating potent antibacterial activity and accelerated tissue regeneration in diabetic mouse models, thereby promoting ...
Jiaheng Liang +12 more
wiley +1 more source
A Security Management and Control Solution of Smart Park Based on Sensor Networks. [PDF]
Zhao Y +5 more
europepmc +1 more source
IT Security Vulnerability and Incident Response Management [PDF]
This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer (application) system design, implementation or operation ...
openaire +1 more source
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim +6 more
wiley +1 more source
Security Management Suitable for Lifecycle of Personal Information in Multi-User IoT Environment. [PDF]
Lee Y, Lee GY.
europepmc +1 more source
Risk Management for e-Business [PDF]
In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps
Floarea NASTASE, Pavel NASTASE
core
Reprogrammable multi‐material smart textiles knitted from liquid crystal elastomer fibers undergo 2D and 3D deformation under thermal and photo stimuli. Circularly knitted tubular structures reversibly contract in radial and axial directions, enabling autonomous climbing, liquid release, and micro pumping.
Xue Wan +8 more
wiley +1 more source

