Results 241 to 250 of about 90,690 (297)

From Membrane Composition to Antimicrobial Strategies: Experimental and Computational Approaches to AMP Design and Selectivity

open access: yesSmall, EarlyView.
Antimicrobial peptides (AMPs) are promising candidates for next‐generation antibiotics, acting through mechanisms such as membrane disruption and intracellular targeting. This review examines how variations in bacterial membrane composition critically influence AMP activity.
Paolo Rossetti   +5 more
wiley   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Real time urban traffic prediction using RFID and a hybrid LSTM random forest model. [PDF]

open access: yesSci Rep
Khattab O   +6 more
europepmc   +1 more source

Opportunities for 2D‐Material‐Based Multifunctional Devices and Systems in Bioinspired Neural Networks

open access: yesSmall, EarlyView.
Bio‐inspired computing offers a route to highly energy‐efficient artificial intelligence. The unique physical properties of two‐dimensional (2D) materials can further enhance such computing approaches. This perspective highlights recent developments in 2D materials‐based neuromorphic devices and discusses future opportunities for integrating such novel
Jin Feng Leong   +9 more
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy