Results 61 to 70 of about 1,753,778 (277)

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, Accepted Article.
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper   +7 more
wiley   +1 more source

Robust Resource Allocation With Power Outage Guarantees for Energy Harvesting Aided Device-to-Device Communication

open access: yesIEEE Access, 2020
This paper studies the robust resource allocation to improve the robustness against the channel state information (CSI) uncertainties for energy harvesting (EH)-aided device-to-device (D2D) communication underlaying cellular network.
Yanbo Ma   +4 more
doaj   +1 more source

Security models for trusting network appliances [PDF]

open access: yes, 2002
A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment.
English, Colin   +4 more
core   +1 more source

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

Research on a Framework for Chinese Argot Recognition and Interpretation by Integrating Improved MECT Models

open access: yesEntropy
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li   +3 more
doaj   +1 more source

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

open access: yes, 2016
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N.   +6 more
core   +1 more source

3D‐Printed Giant Magnetoresistive (GMR) Sensors Based on Self Compliant Springs

open access: yesAdvanced Engineering Materials, EarlyView.
This work explores 3D‐printed GMR sensors utilizing self‐compliant spring structures and conductive PLA composites. By optimizing arm width, we achieved high piezoresistive (0.34%/mm) and magnetoresistive (0.77%/mT) sensitivities. Demonstrated through Bluetooth‐integrated pressure and magnetic position sensing, these full printed low‐cost, customizable
Josu Fernández Maestu   +4 more
wiley   +1 more source

An Efficient and Intelligent Interest-Based Personalized Search Over Encrypted Outsourced Data in Clouds

open access: yesIET Information Security
As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy
Guoxiu Liu   +4 more
doaj   +1 more source

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments

open access: yesIEEE Access, 2019
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang   +3 more
doaj   +1 more source

Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading

open access: yesAdvanced Engineering Materials, EarlyView.
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley   +1 more source

Home - About - Disclaimer - Privacy