Results 171 to 180 of about 667,722 (335)
Unraveling Privacy Threat Modeling Complexity: Conceptual Privacy Analysis Layers [PDF]
Analyzing privacy threats in software products is an essential part of software development to ensure systems are privacy-respecting; yet it is still a far from trivial activity. While there have been many advancements in the past decade, they tend to focus on describing 'what' the threats are.
arxiv
Laser‐Induced Plasma Effects on Bond Breaking in High‐Density Polyethylene Pyrolysis
This study introduces a novel application of Laser‐Induced Breakdown Spectroscopy (LIBS) for bond breaking in high‐density polyethylene (HDPE), an area previously unexplored in laser‐plastic interactions. For the first time, a numerical model has been developed to differentiate between photon‐induced and laser field‐induced plasma, demonstrating the ...
Rao Adeel Un Nabi+5 more
wiley +1 more source
REQUIREMENTS ENGINEERING TO AUDIT PRIVACY ISSUES IN MEDICAL AND HEALTH SOFTWARE
M.A. Martı́nez+2 more
openalex +1 more source
An Atomic‐Scale View at γ’‐Fe4N as Hydrogen Barrier Material
This study demonstrates the efficacy of γ’‐Fe4N nitride layers, formed via gas nitriding, as hydrogen permeation barriers. Advanced characterization, hydrogen permeation analysis, and DFT calculations reveal a 20 fold reduction in hydrogen diffusion at room temperature.
Aleksander Albrecht+11 more
wiley +1 more source
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on.
Sampsa Rauti, Samuli Laato
doaj +1 more source
Facile Synthesis of a Carbon Nano Dot‐Based Wearable Flexible Thermoelectric Device
A wearable proto‐type device made with low‐cost, bio‐friendly, and environmentally safe materials that can be readily fabricated to generate energy from low waste temperatures is demonstrated. The Carbon Nano Dot composite thin films are supported by a flexible cellulose substrate that harnesses thermoelectric principles to generate power from body ...
Al Jumlat Ahmed+8 more
wiley +1 more source
Protecting Privacy in Software Logs: What Should Be Anonymized? [PDF]
Software logs, generated during the runtime of software systems, are essential for various development and analysis activities, such as anomaly detection and failure diagnosis. However, the presence of sensitive information in these logs poses significant privacy concerns, particularly regarding Personally Identifiable Information (PII) and quasi ...
arxiv
Magnetic Steganography Based on Wide‐Field Diamond Quantum Microscopy
This document illustrates magnetic steganography. Magnetic graphics, including pixel art and QR codes, are produced using magnetic materials (such as Ni) and obscure behind patterns manufactured using non‐magnetic materials (such as Au), which are unveiled through widefield quantum microscopy. Furthermore, manipulating the electron spin of NV with dual
Jungbae Yoon+7 more
wiley +1 more source
The transition to emergency remote teaching (ERT) through the use of video conferencing software during the COVID-19 lockdowns posed significant challenges to privacy management for both pupils and teachers across the world.
Leyla Dogruel+3 more
doaj +1 more source
This study introduces a textile‐based capacitive pressure sensor featuring a triangular prism microstructure, which significantly enhances sensitivity to 5.52% kPa−¹ and supports a wide sensing range up to 330 kPa. The sensor's performance is validated in a 4‐channel capacitive pressure‐based force myography (cFMG) armband for gesture recognition ...
Rayane Tchantchane+3 more
wiley +1 more source