Results 101 to 110 of about 1,298,703 (336)
Wireless sensor networks are already employed in numerous applications including military, industry, and health. Among the several inherent limitations in wireless sensor network, security is a critical concern.
Min Wei, Keecheon Kim
doaj +1 more source
Critical Management Issues for Implementing RFID in Supply Chain Management [PDF]
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability ...
Srivastava, Bharatendu
core +1 more source
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge +5 more
wiley +1 more source
Purpose This study aims to develop and test a technology acceptance model for a satellite-based hydrometeorology early warning system in Indonesia.Design/methodology/approach The model was developed by extending TAM, through the inclusion of three ...
Igif Gimin Prihanto +7 more
doaj +1 more source
Statistical assessment – as a part of security assessment applied to a block cipher [PDF]
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj
Security Tests for Maritime Workers: Due Process under the Port Security Program [PDF]
Ralph S. Brown, John D. Fassett
openalex +1 more source
In‐mold electronics (IME) undergo complex thermoforming and over‐molding processes that strain device integrity. This study demonstrates how adapting the amount and placement of structural adhesive to local deformation levels preserves electrical functionality.
Francisco Ituriel Arias‐García +3 more
wiley +1 more source
"Suitable Home" Tests under Social Security: A Functional Approach to Equal Protection [PDF]
openalex +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht +5 more
wiley +1 more source
Microwave resonance detection method for hidden crack depth in rock and cementitious mortar
Before the rock in engineering projects such as mining, tunnel excavation, steep road construction, and oil and gas extraction undergoes failure, macroscopic and microscopic cracks will appear. The management or utilization of these cracks is inseparable
Chuanjing Ou +5 more
doaj +1 more source

