Results 91 to 100 of about 65,097 (295)
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which ...
Shuan-bao LI+5 more
doaj +2 more sources
DALiuGE: A Graph Execution Framework for Harnessing the Astronomical Data Deluge
The Data Activated Liu Graph Engine - DALiuGE - is an execution framework for processing large astronomical datasets at a scale required by the Square Kilometre Array Phase 1 (SKA1).
An, Tao+13 more
core
Payload/burned-out motor case separation system Patent [PDF]
Payload/spent rocket engine case separation ...
Watson, N. D.
core +1 more source
Biodegradable Implantable Electronics with Wireless Technology for Real‐Time Clinical Applications
The article explores how bioresorbable implantable electronics merge wireless communication and power delivery with biodegradable materials to enable real‐time clinical applications. It highlights advances in materials, system design, and medical uses across neural, cardiovascular, digestive, immune, and drug‐delivery systems.
Myeongki Cho+4 more
wiley +1 more source
Polymer‐based drug delivery systems can effectively overcome the limitations of free drugs in terms of solubility, stability, and plasma half‐life, yet their development has traditionally relied on time‐consuming trial‐and‐error approaches. This review highlights recent advances in applying molecular simulation to the design of polymer‐based drug ...
Ping Gao+4 more
wiley +1 more source
Steps Towards Scalable and Modularized Flight Software for Unmanned Aircraft Systems
Unmanned aircraft (UA) applications impose a variety of computing tasks on the on-board computer system. From a research perspective, it is often more convenient to evaluate algorithms on bigger aircraft as they are capable of lifting heavier loads and ...
Johann C. Dauer+2 more
doaj +1 more source
Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption
Social networking and cloud computing are being extensively used, and in this era, the frequency of sending information or images to each other is increasing. The prevention of private information leakage during communication over the Internet has become
Hsiang-Ying Wang+4 more
doaj +1 more source
This work explores the MOF landscape to select a single, optimal candidate for successfully delivering cancer drugs (gemcitabine, paclitaxel, SN‐38) into tough pancreatic tumors. Machine learning and simulations guide this search, demonstrating colloidal stability, excellent biocompatibility, cellular uptake, and sustained release.
Francesca Melle+9 more
wiley +1 more source
DNA‑Directed Assembly of Photonic Nanomaterials for Diagnostic and Therapeutic Applications
DNA‐directed assembly offers a powerful strategy for constructing structured photonic nanomaterials with precise spatial control. This review provides a comprehensive overview of recent advancements in DNA‐assembled photonic nanomaterials for diagnostics and therapeutics, highlighting key design principles, functionalization strategies, and optical ...
Longjiang Ding+5 more
wiley +1 more source
Harnessing Photo‐Energy Conversion in Nanomaterials for Precision Theranostics
Harnessing photo‐energy conversion in nanomaterials enables precision theranostics through light‐driven mechanisms such as photoluminescence, photothermal, photoelectric, photoacoustic, photo‐triggered surface‐enhanced Raman scattering (SERS), and photodynamic processes. This review explores six fundamental principles of photo‐energy conversion, recent
Jingyu Shi+4 more
wiley +1 more source