Results 91 to 100 of about 911,528 (286)
The current state and future of mobile security in the light of the recent mobile security threat reports. [PDF]
Cinar AC, Kara TB.
europepmc +1 more source
A thermo‐responsive poly(2‐oxazoline)‐based injectable formulation is developed to modulate intraocular pressure (IOP) in both normal and hypotonic eyes. By adjusting the PEG content, the aggregation behavior is finely tuned, enabling IOP elevation without long‐term deposition.
Yuji Tanaka +2 more
wiley +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones
The proliferation of drones across precision agriculture, disaster response operations, and delivery services has accentuated the critical need for secure communication frameworks. Due to the limited computational capabilities of drones and the fragility
Yu Su +5 more
doaj +1 more source
Magnetic Ion Channel Activation (MICA) enables remote stimulation of mechanosensitive ion channels using functionalised magnetic nanoparticles, enhancing extracellular vesicle (EV) biogenesis is pre‐osteoblasts. MICA desrived EVs exhibit typical nano‐vesicular characteristics but display superior pro‐osteogeneic activity, promoting mesenchymal stem ...
Afeesh Rajan Unnithan +9 more
wiley +1 more source
Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports.
Taejoo Cho, Hyunki Kim, Jeong Hyun Yi
doaj +1 more source
Design and Synthesis of Peptide‐Polyester Conjugates for Cell‐Mediated Scaffold Degradation
This work describes polycaprolactone (PCL)‐based biomaterials engineered to degrade in response to cell‐secreted proteases. A fast‐degrading peptide (Fast) sequence is integrated into a PCL conjugate backbone to produce a biomaterial that is selectively degraded by multiple cell types compared to its scrambled control (ScrFast).
Korina Vida G. Sinad +7 more
wiley +1 more source
This talk...Briefly introduces security terminology. Discusses a range of security problems arising in a pervasive and mobile computing environment. Also covers possible directions for solutions to some of the problems. Although it covers number of topics, they are all inter-related (as will become obvious!).
openaire +3 more sources
The paper discusses a new framework combining the possibilities of Big Data processing and machine leaning developed for security monitoring of mobile Internet of Things. The mathematical foundations and the problem statement are considered.
Igor Kotenko +2 more
doaj +1 more source
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
ABSTRACT Magnetogenetic deep brain stimulation (MG‐DBS) represents a wireless neuromodulation that has demonstrated long‐lasting behavioral benefits in Parkinson's disease models. However, the circuit‐level mechanisms underlying these therapeutic effects have remained uncharacterized due to limitations of conventional neural interfaces.
Jakyoung Lee +10 more
wiley +1 more source

