Results 101 to 110 of about 5,525,844 (353)

Security-Autonomy-Mobility Roadmaps: Passports To Security for Youth [PDF]

open access: yes, 2016
Taking the highway along the California coast and swinging inland into one of the state\u27s agricultural belts, the hills appear golden in the distance, spotted with gnarled oak trees.
Robinson, Laura, Schulz, Jeremy
core   +1 more source

3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment

open access: yesAdvanced Engineering Materials, EarlyView.
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian   +5 more
wiley   +1 more source

Wafer Bonding Technologies for Microelectromechanical Systems and 3D ICs: Advances, Challenges, and Trends

open access: yesAdvanced Engineering Materials, EarlyView.
This review explores wafer bonding technologies, covering wafer preparation, activation methods, and bonding mechanisms. It compares direct and indirect bonding, highlights recent advancements and future trends, and examines applications in 3D integration and packaging.
Abdul Ahad Khan   +5 more
wiley   +1 more source

Rapid antibiotic susceptibility testing for urinary tract infections in secondary care in England: a cost-effectiveness analysis

open access: yesBMJ Open
Objectives To perform a model-based cost-effectiveness evaluation of a rapid antimicrobial susceptibility test.Design A Markov model of a cohort of hospital inpatients with urinary tract infection (with inpatient numbers based on national administrative ...
Julie V Robotham   +7 more
doaj   +1 more source

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [PDF]

open access: yes, 2004
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features may be achieved by multiple encrypting a message, such as the key-insulated cryptosystems and anonymous channels.
Junji Shikata   +3 more
openaire   +2 more sources

Large Area, Cost‐Effective, and Ultra‐Fast Fabrication of Mini‐Coils Toward Noninvasive Magnetic Applications

open access: yesAdvanced Engineering Materials, EarlyView.
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge   +5 more
wiley   +1 more source

Assessing inequalities in risk of invasive group A streptococcal infections according to residential setting, England 2015-2023

open access: yesInternational Journal of Infectious Diseases
Background: Longitudinal increases in rates of invasive group A streptococcal (iGAS) infection are being seen across high-income countries, including the UK. In the absence of a vaccine, opportunities for prevention remain limited.
Dr Theresa Lamagni   +10 more
doaj   +1 more source

Impact of Structural Adhesive Hybridization Strategy on the Performance of In‐Mold Electronics Devices Across Thermoforming and Injection Molding

open access: yesAdvanced Engineering Materials, EarlyView.
In‐mold electronics (IME) undergo complex thermoforming and over‐molding processes that strain device integrity. This study demonstrates how adapting the amount and placement of structural adhesive to local deformation levels preserves electrical functionality.
Francisco Ituriel Arias‐García   +3 more
wiley   +1 more source

Detection of Electric Network Frequency in Audio Using Multi-HCNet

open access: yesSensors
With the increasing application of electrical network frequency (ENF) in forensic audio and video analysis, ENF signal detection has emerged as a critical technology.
Yujin Li   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy