Results 71 to 80 of about 209,003 (282)

Cold Atmospheric Plasma‐Activated Decellularized Extracellular Matrix Gel as a Tumor‐Infiltrating Immunoactivation Platform for Post‐Surgical Cancer Immunotherapy

open access: yesAdvanced Materials, EarlyView.
An injectable cold atmospheric plasma‐activated decellularized tumor extracellular matrix hydrogel is introduced as a post‐surgical immunoactivation platform. The engineered gel attracts residual tumor cells and induces immunogenic cell death, reshaping the tumor microenvironment and eliciting systemic antitumor immunity. In combination with checkpoint
Tianxu Fang   +5 more
wiley   +1 more source

Umpiring security Models for MANETS

open access: yesJournal of Computer Science and Technology, 2012
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both.
Ayyaswamy Kathirvel
doaj  

Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications [PDF]

open access: yesJournal of Advances in Computer Engineering and Technology, 2016
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable.
Mohammadreza Pourkiani   +2 more
doaj  

Stable Protein‐Based G‐Quadruplex‐Derived Supramolecular Bioinks as Tunable ECM‐Mimetic Constructs Assembled by Combining Non‐Covalent and Covalent Strategies

open access: yesAdvanced Materials, EarlyView.
Harnessing the synergistic interplay of supramolecular self‐assembly, under macromolecular crowding conditions, and enzymatic‐mediated covalent crosslinking toward a stable protein‐based G‐quadruplex‐derived supramolecular bioink. This bioinspired strategy enables the biofabrication of complex and tunable ECM‐mimetic constructs, providing a platform ...
Vera Sousa   +6 more
wiley   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing

open access: yesAdvanced Materials, EarlyView.
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee   +21 more
wiley   +1 more source

SPM: Source Privacy for Mobile Ad Hoc Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2010
Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications.
Jian Ren, Yun Li, Tongtong Li
doaj   +2 more sources

A DHCP-based IP address autoconfiguration for MANETs [PDF]

open access: yes, 2006
Mobile Ad hoc Networks (MANETs) are expected to become more and more important in the upcoming years, playing a significant role in 4G networks. In order to enable the deployment of IP services in such networks, IP address autoconfiguration mechanisms
Bernardos Cano, Carlos Jesús   +1 more
core   +2 more sources

Conductive Hydrogels for Exogenous Sensing and Cell Fate Control

open access: yesAdvanced Materials, EarlyView.
We engineer electrically conductive hydrogels by combining sulfated glycosaminoglycans with semiconducting polymers. These hydrogels bind bioactive proteins, including growth factors, whose release or retention can be modulated by low‐voltage stimulation. The hydrogels are also integrated as 3D channels in organic electrochemical transistors as part of
Teuku Fawzul Akbar   +15 more
wiley   +1 more source

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

Home - About - Disclaimer - Privacy