Results 41 to 50 of about 19,739 (264)

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

BBDetector: A Precise and Scalable Third-Party Library Detection in Binary Executables with Fine-Grained Function-Level Features

open access: yesApplied Sciences, 2022
Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential to identify third-party dependencies and take immediate corrective action to fix critical ...
Xiaoya Zhu   +4 more
doaj   +1 more source

Tuning the Electronic Structure and Spin State of Fe─N─C Catalysts Using an Axial Oxygen Ligand and Fe Clusters for High‐Efficiency Rechargeable Zinc–Air Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou   +8 more
wiley   +1 more source

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +3 more sources

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

JSBiRTH: Dynamic javascript birthmark based on the run-time heap [PDF]

open access: yes, 2011
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection.
Chan, PPF, Hui, LCK, Yiu, SM
core   +1 more source

Gram‐Scale Production of Iron Oxide Rubik‐Cube Nanoparticles: New Tools for the Clinical Translation of Magnetic Hyperthermia and Magnetic Particle Imaging

open access: yesAdvanced Functional Materials, EarlyView.
This work reports the first gram‐scale solvothermal synthesis of ‘Rubik's cube’ nanoparticles—cubic, dendritic multicore structures with tuneable sizes and exceptional magnetic heating performance. Featuring iron oxide single‐domain character, with low coercivity fields, high magnetization, and strong MPI signals, they enable viscosity‐independent ...
Giusy M. R. Rizzo   +12 more
wiley   +1 more source

The method of generation program code with indistinguishable functionality

open access: yesБезопасность информационных технологий, 2017
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj   +1 more source

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +1 more source

Increased Anti‐Psoriatic Effect of Anti‐Inflammatory Dendrimers Using Fluid Catanionic Vesicle‐Based Topical Formulations

open access: yesAdvanced Healthcare Materials, EarlyView.
Next‐Generation Psoriasis Therapy – With advanced dendrimer‐based formulations, this study paves the way for highly effective, skin‐permeable treatments. Encapsulated in fluid catanionic vesicles, IMD‐006 and its analogues show promising anti‐psoriatic effects offering a targeted, non‐invasive approach to managing chronic skin inflammation.
Ranime Jebbawi   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy