Results 81 to 90 of about 8,823,201 (335)
Electrically Insulating Electromagnetic Interference Shielding Materials: A Perspective
Developing electromagnetic interference (EMI) shielding materials with inherent electrical insulation and high EMI shielding effectiveness is challenging but important for electronic applications. This perspective summarizes the recent advancements in designing electrically insulating EMI shielding materials and discusses the underlying mechanisms of ...
Ji Liu, Valeria Nicolosi
wiley +1 more source
Background and Objectives: Adherence to low-sodium diet is an important aspect of self-care behaviors, which plays a role in improving the quality of life, and in reducing readmission rate, mortality, and healthcare costs. This study aimed to investigate
Sharareh Zeighami Mohammadi+6 more
doaj
Tie-RBAC: An application of RBAC to Social Networks [PDF]
This paper explores the application of role-based access control to social networks, from the perspective of social network analysis. Each tie, composed of a relation, a sender and a receiver, involves the sender's assignation of the receiver to a role with permissions. The model is not constrained to system-defined relations and lets users define them
arxiv
Secure Social Recommendation based on Secret Sharing [PDF]
Nowadays, privacy preserving machine learning has been drawing much attention in both industry and academy. Meanwhile, recommender systems have been extensively adopted by many commercial platforms (e.g. Amazon) and they are mainly built based on user-item interactions. Besides, social platforms (e.g.
arxiv
Ultrathin, flexible neural probes are developed with an innovative, biomimetic design incorporating brain tissue‐compatible materials. The material system employs biomolecule‐based encapsulation agents to mitigate inflammatory responses, as demonstrated through comprehensive in vitro and in vivo studies.
Jeonghwa Jeong+7 more
wiley +1 more source
Detecting cyber threats through social network analysis: short survey [PDF]
This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described.
arxiv
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao+17 more
wiley +1 more source
This review covers the recent advances in the synthesis and properties of stable radical polymers (SRPs) and presents their applications in electronics, magnetics, optoelectronics, and biomedicines. The review concludes with a discussion of the challenges in radical chemistry and functionalization, while shedding light on the groundbreaking potential ...
Yufeng Xiong+11 more
wiley +1 more source
The Cycle of Earnings Inequality: Evidence from Spanish Social Security Data
We use detailed information on labor earnings and employment from social security records to document the evolution of earnings inequality in Spain from 1988 to 2010.
S. Bonhomme, Laura Hospido
semanticscholar +1 more source
The developed all‐organic solar cells achieve a power conversion efficiency of 8.7%, more than double the previous record. In addition, bioplastic substrates are used to produce environmentally friendly solar cells with an efficiency of 8.6%. These results are achieved by developing high‐performance organic electrodes without acid doping or high ...
Keiju Hashida+12 more
wiley +1 more source