Results 111 to 120 of about 186,948 (311)
Information security. 4. Information security in network.
Tsutomu Matsumoto
openalex +2 more sources
Low‐Cost WS2 Photodetector on Water‐Soluble Paper for Transient Electronics
This study presents a transient WS2 photodetector fabricated on water‐soluble paper using simple mechanical abrasion and pencil drawing. The device demonstrates reliable photoresponse and mechanical flexibility. It dissolves in water within seconds after use, enabling material recovery and reuse.
Gulsum Ersu+4 more
wiley +1 more source
Retracted: Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data. [PDF]
Intelligence And Neuroscience C.
europepmc +1 more source
Summary of Security Technologies for Information Network Systems
Kinko Yamamoto
openalex +2 more sources
The Implementation of Policy Management Tool Based on Network Security Policy Information Model [PDF]
Geon Lyang Kim+2 more
openalex +1 more source
Janus (MoS2) transistors functionalized with sodium alginate (SA) and poly(vinylidene fluoride‐co‐trifluoroethylene) [P(VDF‐TrFE)] exhibit persistent photo‐induced ionic gating, driven by dynamic cation migration at the hybrid interface. This ionic mechanism enables finely tunable photoconductivity and emulates key synaptic plasticity behaviors ...
Yeonsu Jeong+5 more
wiley +1 more source
Automatic analysis of alarm embedded with large language model in police robot
Police robots are used to assist police officers in performing tasks in complex environments, so as to improve the efficiency of law enforcement, ensure the safety of police officers and maintain social stability.
Zirui Liu, Haichun Sun, Deyu Yuan
doaj
Towards Provable Security of Substitution-Permutation Encryption Networks
Zhi -Guo Chen, S.E. Tavares
openalex +1 more source
This work presents a soft microelectrode array based on vertically aligned carbon nanotube (CNT) forests, combining high conductivity with mechanical softness. A densification process and air‐pressure‐assisted flexibilization improve structural integrity, ensuring stable insertion and reduced inflammation.
Hyeonhee Roh+8 more
wiley +1 more source
A novel network security situation assessment model based on multiple strategies whale optimization algorithm and bidirectional GRU. [PDF]
Zhang S, Fu Q, An D, He Z, Liu Z.
europepmc +1 more source