Results 111 to 120 of about 801,622 (296)
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Research on the teaching reform of the “four in one” course of computer network security [PDF]
This article combines the current characteristics of the "Computer Network Security" course in network engineering majors in universities, and continuously improves students' ability to apply theoretical knowledge through teaching them theoretical ...
Liu Li
doaj +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu +6 more
wiley +1 more source
SOCIAL ENGINEERING: AN INFORMATION SECURITY THREAT IN ENTERPRISES
Today, information and communication technologies (ICTs) have become very important tools in business processes. However, especially with the widespread use of the Internet, security threats have also increased, such as customer information and business secrets fraud, changing the digital data easily, data theft, viruses and hackers etc.
Acilar, Ali, Bastug, Ayse
openaire +1 more source
Bioinspired Stabilization of Fluorescent Au@SiO2 Tracers for Multimodal Biological Imaging
This study demonstrates a bioinspired stabilization strategy for fluorescent gold‐silica nanoparticles. Inspired by natural biosilica maturation, high‐temperature calcination transforms the silica shells, preventing dissolution in cell culture media and intracellular environments.
Wang Sik Lee +5 more
wiley +1 more source
A circular route, involving upcycling of waste surgical masks, affords a Mn‐based layered carbide with porosity, redox activity and low work function. These features enable its effective operation as positive supercapacitor electrode in an aqueous asymmetric supercapacitor delivering 213 Wh L−1 energy density.
Debabrata Nandi +7 more
wiley +1 more source
Shielding Against Social Engineering Threats: A Counterintelligence Approach
In an increasingly networked global context, commercial counterintelligence units and competitive intelligence experts must deal with sophisticated social engineering threats that exploit human psychology rather than technological shortcomings.
Anastasios-Nikolaos KANELLOPOULOS
doaj +1 more source
SOCIAL ENGINEERING: UNDERSTANDING HUMAN FACTORS IN CYBER SECURITY
In the ever-evolving landscape of cyber security, technological defenses alone are insufficient to protect sensitive information and systems. Social engineering, a manipulation technique that exploits human psychology, has emerged as one of the most significant threats to information security.
null ERNEST O. NONUM +2 more
openaire +1 more source

