Results 61 to 70 of about 107,963 (285)
Combination Of Fingerprint For Privacy Protection
Biometric refers to the authentication technique which depends on the measurement and statistical analysis of people’s physical and behavioral characteristics. Among all the biometric technique fingerprint identification is consider as most reliable technique as every individual has unique fingerprint.
Miss Rathod Leena Anil, D B Mantri
openaire +3 more sources
This review highlights recent advances in microfluidic technologies for modeling human aging and age‐related diseases. It explores how organ‐on‐chip platforms improve physiological relevance, enable rejuvenation strategies, facilitate drug screening, detect senescent cells, and identify biomarkers.
Limor Zwi‐Dantsis+5 more
wiley +1 more source
Engineered 3D‐Cad/IL6‐MSC, developed through synergistic hE/N‐cad‐Fc and IL‐6 preconditioning, show remarkable therapeutic potential for systemic sclerosis. These engineered MSC aggregates reduce pathogenic inflammatory cell infiltration and restore immune balance among CD4+ T‐cell populations, offering a promising approach to optimize MSC based ...
Yue Zhang+11 more
wiley +1 more source
A dual‐head airbrush‐based spraying device, combined with a fibrinogen bioink enriched with glycosaminoglycans and collagen, enables the delivery of biomaterials and cells to promote wound healing. This system demonstrates effective skin regeneration in vitro and in vivo, with comparable results to autografts.
Paula Pleguezuelos‐Beltrán+7 more
wiley +1 more source
Adaptive Transformation for Robust Privacy Protection in Video Surveillance
Privacy is a big concern in current video surveillance systems. Due to privacy issues, many strategic places remain unmonitored leading to security threats.
Mukesh Saini+3 more
doaj +1 more source
This review highlights recent progress in nanocarriers targeting pattern recognition receptors (PRRs), including Toll‐like and NOD‐like receptors, for enhancing the treatment of bacterial sepsis and related complications. These nanomedicines deliver antibiotics and anti‐inflammatory agents while modulating immune responses.
Eman A. Ismail+3 more
wiley +1 more source
Motivational Factors in Privacy Protection Behaviour Model for Social Networking
This study aims to investigate the determinants of the privacy protection behaviour strategies that been employed by users while utilising SNSs. By understanding the determinants of privacy protection will be able to generate awareness that can protect ...
Sedek Muliati+2 more
doaj +1 more source
Introduction. This article provides an overview regarding privacy and data protection laws and principles around the world. It is based on lectures by the author on May 17, 2018 at Moscow State Institute of International Relations (MGIMO) and Lomonosov ...
L. Determann
doaj +1 more source
Privacy for the Protected (Only)
Motivated by tensions between data privacy for individual citizens, and societal priorities such as counterterrorism and the containment of infectious disease, we introduce a computational model that distinguishes between parties for whom privacy is explicitly protected, and those for whom it is not (the targeted subpopulation).
Kearns, Michael+3 more
openaire +2 more sources
Manipulating Ferroelectric Topological Polar Structures with Twisted Light
We demonstrate dynamic control of ferroelectric order in quasi‐2D CsBiNb2O7 using twisted ultraviolet light carrying orbital angular momentum. Our approach harnesses non‐resonant multiphoton absorption and induced strain to modulate topological of ferroelectric polarization textures.
Nimish P. Nazirkar+10 more
wiley +1 more source