Results 151 to 160 of about 1,062,697 (366)
Flexible Strain Sensor Enabled by Back Propagation Neural Network for Gesture Recognition
By combining 3D printing with microfluidics, a flexible strain sensor has been developed in a convenient, safe, and effective way. Consisting of a conductive microfiber with a polyurethane shell and a liquid metal core, the sensor exhibits excellent conductivity and stretchability.
Yikai Wu+4 more
wiley +1 more source
Abstract As a concern with manufacturing industries, circular economy (CE) practices—often labeled “circular manufacturing (CM)”—are industrial tasks through which several circular economy principles have been integrated. Among these circular manufacturing strategies, “3R” (recycle, refurbish/remanufacture, and reuse/redistribute) is the key strategy ...
Kannan Govindan
wiley +1 more source
Abstract Public sector purchasing processes are gaining increasing prominence as a demand‐side innovation tool for addressing national sustainability challenges. Accordingly, there has been growing research attention to this topic. Prior studies suggest three key rationales that underlie the use of public sector procurement to drive innovation: (i) the
Peter Adjei‐Bamfo+4 more
wiley +1 more source
Correlation analysis for reducing signature-based WAF false positives rates
This paper addresses the problem of reducing the number of false positives of signature-based WAF. We propose an automatic method for detecting specific signatures which give high FP rates for the given web application using correlation analysis.
Valeriya Grigorjevna Shervarly+1 more
doaj
Abstract The 2019 coronavirus disease (COVID‐19) pandemic has seriously impacted the performance of all types of businesses. It has given a tremendous structural boost to e‐commerce enterprises by forcing customers to online shopping over visiting physical stores. Moreover, customer expectations of the digital and operational capabilities of e‐commerce
Saurabh Pratap+3 more
wiley +1 more source
Classification and Evaluation of Cloud-Based Testing Tools: The Case Study of Web Applications' Security Testing [PDF]
Martin Lněnička, Jan Čapek
openalex +1 more source
Web Based Application for Cloud Security and Compliance [PDF]
K. Priyanka, R. Shanmuga Priya
openalex +1 more source
Innovating to amplify the voices of young people from marginalized ethnic migrant backgrounds
Abstract The meaningful participation of young people from marginalized ethnic backgrounds in civic processes is central to the social cohesion of increasingly diverse liberal democracies, but their participation is compromised by a range of barriers resulting in decision‐making that is disconnected from their lives.
Kelsey L. Deane+7 more
wiley +1 more source
Security For Three-Tiered Web Application
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database).
openaire +2 more sources
EmintWeb: Creation of embedded web applications in C++ for specific systems
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo+2 more
doaj