Results 61 to 70 of about 1,804,817 (300)
Threats to safe transitions from hospital to home: a consensus study in North West London primary care. [PDF]
BACKGROUND: Transitions between healthcare settings are vulnerable points for patients. AIM: To identify key threats to safe patient transitions from hospital to primary care settings.
Ashrafian, H. +5 more
core +2 more sources
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim +6 more
wiley +1 more source
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
Online advertising: analysis of privacy threats and protection approaches [PDF]
Online advertising, the pillar of the “free” content on the Web, has revolutionized the marketing business in recent years by creating a myriad of new opportunities for advertisers to reach potential customers.
Estrada, José +3 more
core +2 more sources
Bio‐Inspired Multimodal Hardware Front‐End Enabled by 2D Floating‐Gate Memory for UAV Perception
A MoS2/h‐BN /graphene floating‐gate memory underpins a bio‐inspired multimodal front end that integrates visual, inertial, and airflow cues. A 4 × 4 FG memory array encodes temporal intensity differences, while IMU‐ and airflow‐driven threshold modulation suppresses self‐motion artifacts, enabling fast, low‐power, robust autonomous UAV tracking and ...
Lianghao Guo +11 more
wiley +1 more source
Zakwity sinicowe występują szczególnie często w zbiornikach małej retencji poddanych wielokierunkowej antropopresji. Obfitemu występowaniu sinic towarzyszy niebezpieczeństwo związane z zachwianiem równowagi tlenowej w środowisku wodnym oraz wydzielaniem ...
Szczukocki Dominik +6 more
doaj +1 more source
Planthopper salivary sheath protein LsSP1 contributes to manipulation of rice plant defenses
Salivary elicitors secreted by herbivorous insects can be perceived by host plants to trigger plant immunity. Here, the authors show that the small brown planthopper salivary sheath protein LsSP1 binds to salivary sheath proteins and contributes to ...
Hai-Jian Huang +15 more
doaj +1 more source
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad +7 more
core +1 more source
Anticipating the species jump: surveillance for emerging viral threats. [PDF]
Zoonotic disease surveillance is typically triggered after animal pathogens have already infected humans. Are there ways to identify high-risk viruses before they emerge in humans? If so, then how and where can identifications be made and by what methods?
Bush, RM +5 more
core +1 more source
Receptor‐Free Identification of Toxic Gases Enabled by Hygroscopic Aqueous Salt Films
Water as a gas sensor coating sounds impossible—until it stops evaporating. Here, hygroscopic salt solutions (LiCl, LiBr, H3PO4) form non‐drying aqueous films on CNT chemiresistors under ambient air. Gases partition into these liquid layers, sometimes transforming into water, and generate salt‐specific resistance fingerprints across a four‐channel ...
Seongwoo Lee +5 more
wiley +1 more source

