Results 151 to 160 of about 186,948 (311)
Fiber orientation in electrospun scaffolds affects permeability and fluid dynamics in microfluidic devices. Combining experimental data with computational fluid dynamic simulations, we show that aligned fibers enhance flow uniformity, reduce pressure and shear stress variability.
Elisa Capuana+4 more
wiley +1 more source
Network Security Situation Prediction Model Based on EMD and ELPSO Optimized BiGRU Neural Network. [PDF]
Zhang B, Jia M, Xu J, Zhao W, Deng L.
europepmc +1 more source
A new model for computer network security risk analysis
Sophie Martel
openalex +2 more sources
Biomimetic, suturable, biodegradable fibrous scaffolds are engineered to mimic the tensile properties of LUT tissue using photocrosslinked 5:5% weight per volume elastin‐like peptide and methacrylated gelatin (5E5G). In vitro, urothelium, smooth muscle, and fibroblast 7 day cytocompatibility is demonstrated.
Renea M. Sturm+18 more
wiley +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A+6 more
europepmc +1 more source
Towards Double Defense Network Security Based on Multi-Identifier Network Architecture. [PDF]
Wang Y, Smahi A, Zhang H, Li H.
europepmc +1 more source
A Technology Foundation for Policy Based Networking with an Emphasis on Enterprise Cyber Security
Curtis Keliiaa
openalex +2 more sources
Multifunctional Biomedical Devices with Closed‐Loop Systems for Precision Therapy
This review explores two major types of closed‐loop therapeutic systems: self‐sustained and externally triggered. It highlights recent advances in stimuli‐responsive materials, integrated bioelectronics, and data‐driven control strategies, offering insight into emerging strategies for personalized, responsive drug delivery.
Yixuan Leng, Rujie Sun
wiley +1 more source
Construction of VAE-GRU-XGBoost intrusion detection model for network security. [PDF]
Chen Y, Zheng X, Wang N.
europepmc +1 more source
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions. [PDF]
Abdel-Basset M+5 more
europepmc +1 more source