Results 41 to 50 of about 1,753,778 (277)

Sustainable bioplastics manufacturing from renewable sources

open access: yesFEBS Open Bio, EarlyView.
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto   +6 more
wiley   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks

open access: yesIEEE Access, 2020
The chemical terrorist attack is a type of unconventional terrorism that threatens the safety of cities. This kind of terrorist attack is highly concealed and difficult to be detected.
Rongchen Zhu   +3 more
doaj   +1 more source

Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems [PDF]

open access: yes, 2015
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network.
Chen, J.   +3 more
core   +2 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Decoding the shadows: multi-modal identity profiling in darknet markets using latent behavior feature fusion

open access: yesDiscover Applied Sciences
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang   +6 more
doaj   +1 more source

ECGYOLO: Mask Detection Algorithm

open access: yesApplied Sciences, 2023
Of past years, wearing masks has turned into a necessity in daily life due to the rampant new coronavirus and the increasing importance people place on health and life safety.
Wenyi Hu   +6 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

open access: yesIET Information Security
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy