Results 151 to 160 of about 1,662,639 (284)

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT [PDF]

open access: yesIssues in Information Systems, 2007
Chandramohan Muniraman   +1 more
doaj  

3D‐Printable, Honeycomb‐Inspired Tissue‐Like Bioelectrodes for Patient‐Specific Neural Interface

open access: yesAdvanced Materials, EarlyView.
3D printed MRI‐compatible tissue‐like neural electrodes tailored to individual gyral patterns. This honeycomb‐inspired printable gel electrode (HiPGE) employs a bioinspired architecture with soft hydrogels, engineered to match the softness of brain tissue.
Marzia Momin   +12 more
wiley   +1 more source

Flexible Dielectric Acoustic Resonator Patch for Tissue Regeneration

open access: yesAdvanced Materials, EarlyView.
A flexible dielectric acoustic resonator patch enables MHz‐range ultrasound generation through resonance amplification without using piezoelectric materials. Conformal integration on a curved substrate allows efficient acoustic delivery to tissue‐mimicking environments.
Donyoung Kang   +7 more
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Soft Ionic and Electronic Triboelectric Nanogenerators: Toward Attachable and Implantable Biomedical Applications

open access: yesAdvanced Materials, EarlyView.
This review provides an overview of triboelectric nanogenerator (TENG)–based biomedical applications by classifying studies into electronic and ionic systems across attachable and implantable platforms. It summarizes key material choices, device structures, and working mechanisms that characterize current TENG‐based research, and outlines six future ...
Kyongtae Choi   +12 more
wiley   +1 more source

Understanding security challenges in the software supply chain through causal relationships. [PDF]

open access: yesPLoS One
Adem A   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy