Results 111 to 120 of about 1,906,176 (266)
The protection of personal data and the use of social networks [PDF]
El uso que en la actualidad se está haciendo de las redes sociales por parte de los usuarios y entidades de la Red reporta numerosas ventajas. Pues se trata de canales que permiten distribuir información de forma fácil y sin apenas limitaciones.
Vázquez Ruano, Trinidad
core +2 more sources
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi +7 more
wiley +1 more source
Sharing, privacy and trust issues for photo collections [PDF]
Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections.
Adams, Anne +2 more
core +1 more source
COFs on MOFs: Layer‐by‐Layer Synthesis of MOF@COF Nanoparticles with Synergistic Adsorption
A layer‐by‐layer strategy enables the growth of crystalline covalent organic framework (COF) shells on metal–organic framework nanoparticles, creating core–shell structures with tunable porosity. Ordered interstitial mesopores are formed during shell growth, which are connected with the COF's intrinsic micropores, thereby enhancing water sorption. This
Ana Guillem‐Navajas +11 more
wiley +1 more source
Enabling the new economic actor: personal data regulation and the digital economy [PDF]
This paper offers a sociological perspective on data protection regulation and its relevance to the design of digital technologies that exploit or ‘trade in’ personal data.
Crabtree, Andy
core
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Cryptographic Foundations of Pseudonymisation for Personal Data Protection
Pseudonymisation constitutes an essential technical and organisational measure for implementing personal data-protection safeguards. Its main goal is to hide identities of individuals, thus reducing data protection and privacy risks through facilitating ...
Konstantinos Limniotis
doaj +1 more source
Eutectozymes as Soft Hybrid Materials for Advanced Biocatalysis
Eutectozymes are sustainable hybrid materials that embed a GOx–HRP cascade within hydrophobic eutectogels featuring a dual supramolecular–covalent network. This architecture preserves native enzyme structure and stability, enables efficient heterogeneous biocatalysis in aqueous media, and positions eutectogels as robust platforms for next‐generation ...
Manuel Eduardo Martinez Cartagena +10 more
wiley +1 more source
A qualitative change of personal information in the age of big data: A Study of court case in Taiwan [PDF]
Big data is boosting the economy, transforming traditional business models and creating new opportunities through the use of business intelligence, sentiment analysis, data mining and analytics.
Yeh, Chih-Liang
core
This review highlights recent advances in electrospun nanofiber‐based triboelectric nanogenerators, emphasizing how material design, fiber architecture, and interface engineering collectively enhance output performance and mechanical durability. Key developments in porous, aligned, core‐shell, and hierarchical nanofibers are discussed alongside ...
MD Fajla Rabbi +3 more
wiley +1 more source

