Results 61 to 70 of about 781,799 (337)

A Bespoke Programmable Interpenetrating Elastomer Network Composite Laryngeal Stent for Expedited Paediatric Laryngotracheal Reconstruction

open access: yesAdvanced Functional Materials, EarlyView.
A programmable interpenetrating double‐network architecture, created via 3D‐TIPS printing and resin infusion, synergistically combines thermoplastic and thermosetting elastomers to balance structural rigidity and surface softness—crucial for paediatric laryngeal stents.
Elizabeth F. Maughan   +14 more
wiley   +1 more source

Functional Materials for Environmental Energy Harvesting in Smart Agriculture via Triboelectric Nanogenerators

open access: yesAdvanced Functional Materials, EarlyView.
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva   +9 more
wiley   +1 more source

Light‐Responsive Enzyme‐Loaded Nanoparticles for Tunable Adhesion and Mechanical Wound Contraction

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a photoactivatable enzyme‐loaded mesoporous nanoparticle system (MPDA_PaTy) that enables light‐triggered tunable tissue adhesion and facilitates mechanical wound contraction. Controlled enzymatic crosslinking at tissue or hydrogel interfaces allows on‐demand adhesion.
Junghyeon Ko   +10 more
wiley   +1 more source

Data-flow Analysis of Programs with Associative Arrays

open access: yes, 2014
Dynamic programming languages, such as PHP, JavaScript, and Python, provide built-in data structures including associative arrays and objects with similar semantics-object properties can be created at run-time and accessed via arbitrary expressions ...
Baštecký, Pavel   +2 more
core   +2 more sources

SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]

open access: yes, 2011
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri   +15 more
core   +7 more sources

Ice Lithography: Recent Progress Opens a New Frontier of Opportunities

open access: yesAdvanced Functional Materials, EarlyView.
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang   +9 more
wiley   +1 more source

An efficient deception architecture for cloud-based virtual networks

open access: yesKuwait Journal of Science, 2019
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj  

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

Application and Web Security [PDF]

open access: yes, 2014
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire   +1 more source

Development of Security Identification and Monitoring System for Web Application [PDF]

open access: yes, 1999
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core  

Home - About - Disclaimer - Privacy