Results 61 to 70 of about 107,963 (285)

Combination Of Fingerprint For Privacy Protection

open access: yes, 2017
Biometric refers to the authentication technique which depends on the measurement and statistical analysis of people’s physical and behavioral characteristics. Among all the biometric technique fingerprint identification is consider as most reliable technique as every individual has unique fingerprint.
Miss Rathod Leena Anil, D B Mantri
openaire   +3 more sources

Aging on Chip: Harnessing the Potential of Microfluidic Technologies in Aging and Rejuvenation Research

open access: yesAdvanced Healthcare Materials, EarlyView.
This review highlights recent advances in microfluidic technologies for modeling human aging and age‐related diseases. It explores how organ‐on‐chip platforms improve physiological relevance, enable rejuvenation strategies, facilitate drug screening, detect senescent cells, and identify biomarkers.
Limor Zwi‐Dantsis   +5 more
wiley   +1 more source

Engineered MSC Aggregates with E/N‐Cadherin and IL‐6 Preconditioning for the Treatment of Systemic Sclerosis

open access: yesAdvanced Healthcare Materials, EarlyView.
Engineered 3D‐Cad/IL6‐MSC, developed through synergistic hE/N‐cad‐Fc and IL‐6 preconditioning, show remarkable therapeutic potential for systemic sclerosis. These engineered MSC aggregates reduce pathogenic inflammatory cell infiltration and restore immune balance among CD4+ T‐cell populations, offering a promising approach to optimize MSC based ...
Yue Zhang   +11 more
wiley   +1 more source

A Novel Sprayable Fibrinogen/Glycosaminoglycans/Collagen‐Based Bioink for Skin Wound Healing Applied by a Handheld Dual‐Head Airbrush

open access: yesAdvanced Healthcare Materials, EarlyView.
A dual‐head airbrush‐based spraying device, combined with a fibrinogen bioink enriched with glycosaminoglycans and collagen, enables the delivery of biomaterials and cells to promote wound healing. This system demonstrates effective skin regeneration in vitro and in vivo, with comparable results to autografts.
Paula Pleguezuelos‐Beltrán   +7 more
wiley   +1 more source

Adaptive Transformation for Robust Privacy Protection in Video Surveillance

open access: yesAdvances in Multimedia, 2012
Privacy is a big concern in current video surveillance systems. Due to privacy issues, many strategic places remain unmonitored leading to security threats.
Mukesh Saini   +3 more
doaj   +1 more source

Nanocarrier‐Based Targeting of Pattern Recognition Receptors as an Innovative Strategy for Enhancing Sepsis Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This review highlights recent progress in nanocarriers targeting pattern recognition receptors (PRRs), including Toll‐like and NOD‐like receptors, for enhancing the treatment of bacterial sepsis and related complications. These nanomedicines deliver antibiotics and anti‐inflammatory agents while modulating immune responses.
Eman A. Ismail   +3 more
wiley   +1 more source

Motivational Factors in Privacy Protection Behaviour Model for Social Networking

open access: yesMATEC Web of Conferences, 2018
This study aims to investigate the determinants of the privacy protection behaviour strategies that been employed by users while utilising SNSs. By understanding the determinants of privacy protection will be able to generate awareness that can protect ...
Sedek Muliati   +2 more
doaj   +1 more source

PRIVACY AND DATA PROTECTION

open access: yesМосковский журнал международного права, 2019
Introduction. This article provides an overview regarding privacy and data protection laws and principles around the world. It is based on lectures by the author on May 17, 2018 at Moscow State Institute of International Relations (MGIMO) and Lomonosov ...
L. Determann
doaj   +1 more source

Privacy for the Protected (Only)

open access: yes, 2015
Motivated by tensions between data privacy for individual citizens, and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation).
Kearns, Michael   +3 more
openaire   +2 more sources

Manipulating Ferroelectric Topological Polar Structures with Twisted Light

open access: yesAdvanced Materials, EarlyView.
We demonstrate dynamic control of ferroelectric order in quasi‐2D CsBiNb2O7 using twisted ultraviolet light carrying orbital angular momentum. Our approach harnesses non‐resonant multiphoton absorption and induced strain to modulate topological of ferroelectric polarization textures.
Nimish P. Nazirkar   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy