Results 61 to 70 of about 1,765,999 (278)
Bioinspired Shape‐Memory Hook Fasteners With Programmable Interlocking and Silent Release
Bioinspired hook fasteners made from epoxy shape‐memory polymers are shown to switch between strong, secure attachment and gentle, silent release when heated. By combining programmable geometry and material response, these adaptive fasteners outperform commercial systems in strength and noise control, enabling new solutions for robotics, medical ...
Maria I. Vallejo Ciro +3 more
wiley +1 more source
This paper studies the robust resource allocation to improve the robustness against the channel state information (CSI) uncertainties for energy harvesting (EH)-aided device-to-device (D2D) communication underlaying cellular network.
Yanbo Ma +4 more
doaj +1 more source
Learning to Customize Network Security Rules
Security is a major concern for organizations who wish to leverage cloud computing. In order to reduce security vulnerabilities, public cloud providers offer firewall functionalities.
Ajay Piriya Vijaya Kumar Saroja (5597705) +4 more
core +6 more sources
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li +3 more
doaj +1 more source
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments
As the progress of digitization in industrial society, large amount of production data are outsourced to the cloud server in order to reduce data management costs. Nevertheless, how to ensure the outsourced data integrality, validity, and availability is
Wenjie Yang +3 more
doaj +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
As the information society advances swiftly, individuals and corporations are producing vast quantities of data daily. Cloud computing presents considerable strengths in storing and applying this data. Yet, challenges related to data security and privacy
Guoxiu Liu +4 more
doaj +1 more source
Deep Spatio-Temporal Graph Attention Network for Street-Level 110 Call Incident Prediction
Recent advancements in crime prediction have increasingly focused on street networks, which offer finer granularity and a closer reflection of real-world urban dynamics.
Jinguang Sui, Peng Chen, Haishuo Gu
doaj +1 more source

