Results 61 to 70 of about 1,765,999 (278)

Bioinspired Shape‐Memory Hook Fasteners With Programmable Interlocking and Silent Release

open access: yesAdvanced Engineering Materials, EarlyView.
Bioinspired hook fasteners made from epoxy shape‐memory polymers are shown to switch between strong, secure attachment and gentle, silent release when heated. By combining programmable geometry and material response, these adaptive fasteners outperform commercial systems in strength and noise control, enabling new solutions for robotics, medical ...
Maria I. Vallejo Ciro   +3 more
wiley   +1 more source

Robust Resource Allocation With Power Outage Guarantees for Energy Harvesting Aided Device-to-Device Communication

open access: yesIEEE Access, 2020
This paper studies the robust resource allocation to improve the robustness against the channel state information (CSI) uncertainties for energy harvesting (EH)-aided device-to-device (D2D) communication underlaying cellular network.
Yanbo Ma   +4 more
doaj   +1 more source

Learning to Customize Network Security Rules

open access: yes, 2017
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705)   +4 more
core   +6 more sources

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Research on a Framework for Chinese Argot Recognition and Interpretation by Integrating Improved MECT Models

open access: yesEntropy
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li   +3 more
doaj   +1 more source

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments

open access: yesIEEE Access, 2019
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang   +3 more
doaj   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

An Efficient and Intelligent Interest-Based Personalized Search Over Encrypted Outsourced Data in Clouds

open access: yesIET Information Security
As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy
Guoxiu Liu   +4 more
doaj   +1 more source

Deep Spatio-Temporal Graph Attention Network for Street-Level 110 Call Incident Prediction

open access: yesApplied Sciences
Recent advancements in crime prediction have increasingly focused on street networks, which offer finer granularity and a closer reflection of real-world urban dynamics.
Jinguang Sui, Peng Chen, Haishuo Gu
doaj   +1 more source

Home - About - Disclaimer - Privacy