Results 211 to 220 of about 9,492,518 (363)
Shape‐Morphing Nanoengineered Hydrogel Ribbons as Hemostats
This study introduces a self‐assembling, shape‐morphing nanoengineered hydrogel ribbon system that rapidly forms porous aggregates in situ for efficient hemostasis in trauma and surgical applications. Abstract Rapid and effective hemorrhage control remains a major challenge in trauma and surgical care, particularly for complex or noncompressible wounds.
Ryan Davis Jr +9 more
wiley +1 more source
Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection. [PDF]
Alashjaee AM.
europepmc +1 more source
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions. [PDF]
Abdel-Basset M +5 more
europepmc +1 more source
Home-Network Security Model In Ubiquitous Environment
Dong-Young Yoo +2 more
openalex +1 more source
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia [PDF]
Muhammad Shakirin Shaari +2 more
openalex +1 more source
Microscale hydrogels (microgels) feature improved mass transport characteristics supportive of fast actuation and chemical tunability amenable to programmed stimuli response. A unique soft actuator architecture is realized by encapsulating microgels in soft microcirculatory systems which enable the convenient delivery of liquid stimuli for powering and
Nengjian Huang +2 more
wiley +1 more source
3D visualization design of digital intelligent landscape environment based on wireless network security. [PDF]
Liao X.
europepmc +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
A novel research on network security situation prediction based on iteratively optimized RBF-NN. [PDF]
Wu Y +5 more
europepmc +1 more source

