Results 151 to 160 of about 1,062,697 (366)

Flexible Strain Sensor Enabled by Back Propagation Neural Network for Gesture Recognition

open access: yesAdvanced Intelligent Systems, EarlyView.
By combining 3D printing with microfluidics, a flexible strain sensor has been developed in a convenient, safe, and effective way. Consisting of a conductive microfiber with a polyurethane shell and a liquid metal core, the sensor exhibits excellent conductivity and stretchability.
Yikai Wu   +4 more
wiley   +1 more source

Tunneling the barriers of blockchain technology in remanufacturing for achieving sustainable development goals: A circular manufacturing perspective

open access: yesBusiness Strategy and the Environment, Volume 31, Issue 8, Page 3769-3785, December 2022., 2022
Abstract As a concern with manufacturing industries, circular economy (CE) practices—often labeled “circular manufacturing (CM)”—are industrial tasks through which several circular economy principles have been integrated. Among these circular manufacturing strategies, “3R” (recycle, refurbish/remanufacture, and reuse/redistribute) is the key strategy ...
Kannan Govindan
wiley   +1 more source

Public procurement for innovation through supplier firms' sustainability lens: A systematic review and research agenda

open access: yesBusiness Strategy and the Environment, Volume 32, Issue 1, Page 387-407, January 2023., 2023
Abstract Public sector purchasing processes are gaining increasing prominence as a demand‐side innovation tool for addressing national sustainability challenges. Accordingly, there has been growing research attention to this topic. Prior studies suggest three key rationales that underlie the use of public sector procurement to drive innovation: (i) the
Peter Adjei‐Bamfo   +4 more
wiley   +1 more source

Correlation analysis for reducing signature-based WAF false positives rates

open access: yesБезопасность информационных технологий, 2015
This paper addresses the problem of reducing the number of false positives of signature-based WAF. We propose an automatic method for detecting specific signatures which give high FP rates for the given web application using correlation analysis.
Valeriya Grigorjevna Shervarly   +1 more
doaj  

Benchmarking sustainable E‐commerce enterprises based on evolving customer expectations amidst COVID‐19 pandemic

open access: yesBusiness Strategy and the Environment, Volume 32, Issue 1, Page 736-752, January 2023., 2023
Abstract The 2019 coronavirus disease (COVID‐19) pandemic has seriously impacted the performance of all types of businesses. It has given a tremendous structural boost to e‐commerce enterprises by forcing customers to online shopping over visiting physical stores. Moreover, customer expectations of the digital and operational capabilities of e‐commerce
Saurabh Pratap   +3 more
wiley   +1 more source

Innovating to amplify the voices of young people from marginalized ethnic migrant backgrounds

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract The meaningful participation of young people from marginalized ethnic backgrounds in civic processes is central to the social cohesion of increasingly diverse liberal democracies, but their participation is compromised by a range of barriers resulting in decision‐making that is disconnected from their lives.
Kelsey L. Deane   +7 more
wiley   +1 more source

Security For Three-Tiered Web Application

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2015
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database).
openaire   +2 more sources

EmintWeb: Creation of embedded web applications in C++ for specific systems

open access: yesSoftwareX
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo   +2 more
doaj  

Home - About - Disclaimer - Privacy