Results 71 to 80 of about 8,823,201 (335)
A Serious Game for Eliciting Social Engineering Security Requirements
Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means. While technical security of most critical systems is high, the systems remain vulnerable to attacks from social engineers ...
Kristian Beckers, Sebastian Pape
semanticscholar +1 more source
This study examines the mechanical properties of triply periodic minimal surfaces (TPMS)‐based lattices, analyzing 36 architectures in elastic and plastic regimes. It evaluates the applicability of beam‐based scaling laws to TPMS lattices. Rigidity arises from the alignment of members with the load direction and solid regions preventing rotation.
Lucía Doyle+2 more
wiley +1 more source
Low‐Velocity Penetration Impact Behavior of Triply Periodic Minimal Surface Strut‐Based Lattices
Triply periodic minimal surface (TPMS)‐based lattices are gaining attention for their multifunctional properties in applications as aeronautics and automotive, which involve low‐velocity impact loading. This work evaluates the low‐velocity penetration impact behavior of five distinct TPMS architectures.
Lucía Doyle+2 more
wiley +1 more source
Frequency of nosocomial pneumonia in ICU Qazvin Razi hospital (2013)
Background: Nosocomial pneumonia is the most prevalent cause of hospital-acquired infection in intensive care units (ICU). The aim of this research was to detect the frequency and predisposing factors of nosocomial Ventilator Associated Pneumonia, by ...
S. Makhlogi, B. Salehi, M. Abdi
doaj
Background and aim: The prevalence of hospital malnutrition (HM) is variable, explained by the variability of patients, the nutritional evaluation method used among others.
Juan Carlos Castillo Pineda+5 more
doaj +1 more source
Security and privacy in social networks
This special issue collates a selection of representative research articles that were primarily presented at the 9th International Conference on Network and System Security.
Yang Xiang+2 more
semanticscholar +1 more source
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao+4 more
wiley +1 more source
Chondroblastomas are rare entities accounting for approximately 1% of all primary bone tumors. We describe a case of a 7-year-old girl with a giant chondroblastoma of the maxilla, treated with bilateral class III maxillectomy and reconstruction with a ...
Miguel de la Parra+4 more
doaj +1 more source
A highly‐entangled polyacrylamide (HE‐PAM) hydrogel is designed as an aqueous electrolyte for the fast charging/discharging properties in Zn/MnO2 batteries. Such hydrogel electrolyte possessed excellent mechanical characters, stable cycling capability, and superb rate performance under high current densities. These characters can also be applied in the
Zhaoxi Shen+11 more
wiley +1 more source
Internalization of Externalities in Interdependent Security: Large Network Cases [PDF]
With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents
arxiv