Results 61 to 70 of about 557,385 (336)

Multifunctional Bio‐Based Packaging for Perishable Foods: Structural Design, Scalable Fabrication, and Versatile Applications

open access: yesAdvanced Materials, EarlyView.
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang   +6 more
wiley   +1 more source

AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing

open access: yesAdvanced Materials, EarlyView.
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee   +21 more
wiley   +1 more source

Unstructured Big Data Threat Intelligence Parallel Mining Algorithm

open access: yesBig Data Mining and Analytics
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm.
Zhihua Li   +3 more
doaj   +1 more source

QBC Inconsistency-Based Threat Intelligence IOC Recognition

open access: yesIEEE Access, 2021
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI ...
Wenli Zeng   +4 more
doaj   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Magnetic Textiles: A Review of Materials, Fabrication, Properties, and Applications

open access: yesAdvanced Materials Technologies, EarlyView.
Magnetic textiles (M‐textiles) are emerging as a programmable materials platform that merges magnetic matter with hierarchical textile structures. This article consolidates magnetic material classes, textile architectures, and fabrication and magnetization strategies, revealing structure–property–function relationships that govern magneto‐mechanical ...
Li Ke   +3 more
wiley   +1 more source

Domain-Oriented Topic Discovery Based on Features Extraction and Topic Clustering

open access: yesIEEE Access, 2020
Topic detection technology can automatically discover new topics on the Internet. This paper investigates domain-oriented feature extraction methods, and proposes a keyword feature extraction method ITFIDF-LP, a subject word feature extraction method LDA-
Xiaofeng Lu   +4 more
doaj   +1 more source

Molecular Appendix Adjusted Architectural Propagations of Red‐Light Controlled Macroscopic Photoactuating Performances

open access: yesAdvanced Robotics Research, EarlyView.
Amphiphilic chloroazobenzenes, bearing different amino acids as end groups alanine, phenylalanine, and valine, exhibit excellent photoisomerizations. Varying structures of three amino acid groups participate in supramolecular formations and therefore photoinduced morphological transformations via adjusting intermolecular interactions. These interaction
Shuangshuang Meng   +3 more
wiley   +1 more source

From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence

open access: yesIEEE Access, 2020
An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks.
Neda Afzaliseresht   +4 more
doaj   +1 more source

Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]

open access: yes, 2018
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core  

Home - About - Disclaimer - Privacy