The vulnerability assessment and obstacle factor analysis of urban agglomeration along the Yellow River in China from the perspective of production-living-ecological space. [PDF]
Yang L, Meng H, Wang J, Wu Y, Zhao Z.
europepmc +1 more source
To address challenges in high‐throughput intestinal sampling with sealed containment and target drug delivery, we developed a dual‐functional ingestible passive capsule with a dual‐triggered control system based on pH‐response and mechanical actuation.
Libing Huang +9 more
wiley +1 more source
The Spatial Shifts and Vulnerability Assessment of Ecological Niches under Climate Change Scenarios for Betula luminifera, a Fast-Growing Precious Tree in China. [PDF]
Hu XG +9 more
europepmc +1 more source
Microorganisms colonizing photovoltaic surfaces in the Atacama desert form biofilms that enhance particle adhesion and reduce energy yield. This study identifies UV‐resistant bacteria and carotenoid‐producing strains that interfere with PV performance.
Douglas Olivares +8 more
wiley +1 more source
Corrigendum to "Vulnerability assessment of food imports-conceptual framework and empirical application to the case of Switzerland" [Heliyon Volume 10, Issue 5, 23 February 2024, e27058]. [PDF]
Ritzel C, Möhring A, von Ow A.
europepmc +1 more source
Related searches:
Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat
2023 International Conference on Business Analytics for Technology and Security (ICBATS), 2023The primary goal of this research article is to identify prevalent network dangers and provide countermeasures to these threats. In this modern era, everyone has access to the internet. SECURITY is a serious issue that everyone faces.
A. Fatima +7 more
semanticscholar +1 more source
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
International Conference on Automated Software Engineering, 2021It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected ...
T. H. Le +3 more
semanticscholar +1 more source
Vulnerability Assessment for Coupled Network Consisting of Power Grid and EV Traffic Network
IEEE Transactions on Smart Grid, 2022With the rapid development of EV in the transportation system, its increasing influence on the power system has attracted more and more attention in recent years.
Nian Liu, Xuejun Hu, Li Ma, Xinghuo Yu
semanticscholar +1 more source

