Results 51 to 60 of about 7,184 (199)

From Food Waste to Valorized Nanomaterials: Sustainable Green Synthesis and Biomedical Applications

open access: yesChemFoodChem, EarlyView.
Food waste‐derived biomolecules act as natural reducing and stabilizing agents for the green synthesis of functional NPs with applications in antimicrobial systems, food packaging, biomedical technologies, and environmental remediation. ABSTRACT Food waste is a global issue, with billions of tons discarded and unutilized annually, causing economic ...
Siddhraj Rajput   +8 more
wiley   +1 more source

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]

open access: yes, 2011
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane   +6 more
core   +3 more sources

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Dietary and biomarker‐guided strategies as supportive measures in the fragile X syndrome

open access: yesFood Biomacromolecules, EarlyView.
Abstract The fragile X syndrome (FXS) is an inherited neurodevelopmental disorder that primarily affects males, often resulting in an IQ below 55, while about two‐thirds of females also experience intellectual disability. Physical features may include an elongated face, prominent ears, finger joint laxity, and enlarged testes in males.
Jailan E. El Halawani, Reem R. AlOlaby
wiley   +1 more source

Techniques for the dynamic randomization of network attributes [PDF]

open access: yes, 2016
Critical infrastructure control systems continue to foster predictable communication paths and static configurations that allow easy access to our networked critical infrastructure around the world.
Chavez, AR, Peisert, S, Stout, WMS
core  

A Formal Treatment of Onion Routing [PDF]

open access: yes, 2005
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the cryptographic aspects of onion routing have not been sufficiently explored: no satisfactory definitions of security have been given, and existing constructions have only had ad-hoc
Jan Camenisch, Anna Lysyanskaya
openaire   +1 more source

Influence of Nanomaterials and Nanocomposites on the Nutrient Composition

open access: yesFood Safety and Health, EarlyView.
Nanomaterials and nanocomposites enhance crop nutrition and food quality by improving nutrient availability, plant uptake, and bioavailability through controlled delivery and nano‐encapsulation. Their applications in agriculture and food systems enable sustainable biofortification, improved preservation, and functional foods, while emphasizing safety ...
Akanksha Dwivedi   +4 more
wiley   +1 more source

Evaluation of Anonymized ONS Queries [PDF]

open access: yes, 2008
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications).
Barbeau, Michel   +2 more
core  

Recent Advances in the Laser‐Based Fabrication and Applications of High‐Entropy Alloy Nanoparticles

open access: yesMetalMat, EarlyView.
This review presents recent advances in the laser‐based fabrication of high‐entropy alloy nanoparticles, focusing on scalable, environmentally friendly, and compositionally tunable synthesis methods. It highlights the critical influence of laser parameters on nanoparticle size, phase, and morphology, enabling tailored properties for applications in ...
Bibek Kumar Singh   +4 more
wiley   +1 more source

Analisis Teknik-Teknik Keamanan Pada Future Cloud Computing vs Current Cloud Computing: Survey Paper

open access: yesJurnal Teknologi dan Sistem Informasi, 2016
Cloud computing adalah salah satu dari teknologi jaringan yang sedang berkembang pesat saat ini, hal ini dikarenakan cloud computing memiliki kelebihan dapat meningkatkan fleksibilitas dan kapabilitas dari proses komputer secara dinamis tanpa perlu ...
Beny Nugraha
doaj   +1 more source

Home - About - Disclaimer - Privacy