Results 101 to 110 of about 1,298,703 (336)

An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Wireless sensor networks are already employed in numerous applications including military, industry, and health. Among the several inherent limitations in wireless sensor network, security is a critical concern.
Min Wei, Keecheon Kim
doaj   +1 more source

Critical Management Issues for Implementing RFID in Supply Chain Management [PDF]

open access: yes, 2010
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability ...
Srivastava, Bharatendu
core   +1 more source

Large Area, Cost‐Effective, and Ultra‐Fast Fabrication of Mini‐Coils Toward Noninvasive Magnetic Applications

open access: yesAdvanced Engineering Materials, EarlyView.
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge   +5 more
wiley   +1 more source

A technology acceptance model of satellite-based hydrometeorological hazards early warning system in Indonesia: an-extended technology acceptance model

open access: yesCogent Business & Management
Purpose This study aims to develop and test a technology acceptance model for a satellite-based hydrometeorology early warning system in Indonesia.Design/methodology/approach The model was developed by extending TAM, through the inclusion of three ...
Igif Gimin Prihanto   +7 more
doaj   +1 more source

Statistical assessment – as a part of security assessment applied to a block cipher [PDF]

open access: yesRevista Română de Statistică, 2016
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj  

Impact of Structural Adhesive Hybridization Strategy on the Performance of In‐Mold Electronics Devices Across Thermoforming and Injection Molding

open access: yesAdvanced Engineering Materials, EarlyView.
In‐mold electronics (IME) undergo complex thermoforming and over‐molding processes that strain device integrity. This study demonstrates how adapting the amount and placement of structural adhesive to local deformation levels preserves electrical functionality.
Francisco Ituriel Arias‐García   +3 more
wiley   +1 more source

3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht   +5 more
wiley   +1 more source

Microwave resonance detection method for hidden crack depth in rock and cementitious mortar

open access: yesScientific Reports
Before the rock in engineering projects such as mining, tunnel excavation, steep road construction, and oil and gas extraction undergoes failure, macroscopic and microscopic cracks will appear. The management or utilization of these cracks is inseparable
Chuanjing Ou   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy