Results 171 to 180 of about 247,400 (347)
Data Security in Cloud Environment Using Cryptography Technique for End-to-End Encryption [PDF]
Akash Badhan +3 more
openalex +1 more source
A programmable interpenetrating double‐network architecture, created via 3D‐TIPS printing and resin infusion, synergistically combines thermoplastic and thermosetting elastomers to balance structural rigidity and surface softness—crucial for paediatric laryngeal stents.
Elizabeth F. Maughan +14 more
wiley +1 more source
Comprehensive usability evaluation of electronic prescription systems: integrating expert and user perspectives. [PDF]
Arabian S +4 more
europepmc +1 more source
Using Game Theory for Los Angeles Airport Security
James Pita +7 more
openalex +2 more sources
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
A hierarchical framework to evaluate the usability of smartphone health applications. [PDF]
Siddique A +4 more
europepmc +1 more source
An efficient intrusion detection system for IoT security using CNN decision forest
Kamal Bella +6 more
openalex +1 more source
Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko +10 more
wiley +1 more source
Targeting undernutrition in Haiti: a spatial analysis for improving food security and reducing stunting in children under five. [PDF]
Atzori D, Sonneveld B, van Wesenbeeck L.
europepmc +1 more source

