From Food Waste to Valorized Nanomaterials: Sustainable Green Synthesis and Biomedical Applications
Food waste‐derived biomolecules act as natural reducing and stabilizing agents for the green synthesis of functional NPs with applications in antimicrobial systems, food packaging, biomedical technologies, and environmental remediation. ABSTRACT Food waste is a global issue, with billions of tons discarded and unutilized annually, causing economic ...
Siddhraj Rajput +8 more
wiley +1 more source
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users [PDF]
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream.
Abdelberi, Chaabane +6 more
core +3 more sources
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Dietary and biomarker‐guided strategies as supportive measures in the fragile X syndrome
Abstract The fragile X syndrome (FXS) is an inherited neurodevelopmental disorder that primarily affects males, often resulting in an IQ below 55, while about two‐thirds of females also experience intellectual disability. Physical features may include an elongated face, prominent ears, finger joint laxity, and enlarged testes in males.
Jailan E. El Halawani, Reem R. AlOlaby
wiley +1 more source
Techniques for the dynamic randomization of network attributes [PDF]
Critical infrastructure control systems continue to foster predictable communication paths and static configurations that allow easy access to our networked critical infrastructure around the world.
Chavez, AR, Peisert, S, Stout, WMS
core
A Formal Treatment of Onion Routing [PDF]
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the cryptographic aspects of onion routing have not been sufficiently explored: no satisfactory definitions of security have been given, and existing constructions have only had ad-hoc
Jan Camenisch, Anna Lysyanskaya
openaire +1 more source
Influence of Nanomaterials and Nanocomposites on the Nutrient Composition
Nanomaterials and nanocomposites enhance crop nutrition and food quality by improving nutrient availability, plant uptake, and bioavailability through controlled delivery and nano‐encapsulation. Their applications in agriculture and food systems enable sustainable biofortification, improved preservation, and functional foods, while emphasizing safety ...
Akanksha Dwivedi +4 more
wiley +1 more source
Evaluation of Anonymized ONS Queries [PDF]
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications).
Barbeau, Michel +2 more
core
Recent Advances in the Laser‐Based Fabrication and Applications of High‐Entropy Alloy Nanoparticles
This review presents recent advances in the laser‐based fabrication of high‐entropy alloy nanoparticles, focusing on scalable, environmentally friendly, and compositionally tunable synthesis methods. It highlights the critical influence of laser parameters on nanoparticle size, phase, and morphology, enabling tailored properties for applications in ...
Bibek Kumar Singh +4 more
wiley +1 more source
Analisis Teknik-Teknik Keamanan Pada Future Cloud Computing vs Current Cloud Computing: Survey Paper
Cloud computing adalah salah satu dari teknologi jaringan yang sedang berkembang pesat saat ini, hal ini dikarenakan cloud computing memiliki kelebihan dapat meningkatkan fleksibilitas dan kapabilitas dari proses komputer secara dinamis tanpa perlu ...
Beny Nugraha
doaj +1 more source

