Results 81 to 90 of about 787,843 (284)
Search-based Tier Assignment for Optimising Offline Availability in Multi-tier Web Applications
Web programmers are often faced with several challenges in the development process of modern, rich internet applications. Technologies for the different tiers of the application have to be selected: a server-side language, a combination of JavaScript ...
De Koster, Joeri +3 more
core +1 more source
Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi +12 more
wiley +1 more source
Implementing security framework of electronic business application [PDF]
Security is an essential issue in e-commerce. Lack of security knowledge exposed e commerc e customer to threat. Security threat such as viruses, Trojan and malicious software could put customer to danger.
Aman, Hannani
core
From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley +1 more source
Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu +4 more
wiley +1 more source
Secure Development - Web Application Security.
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire +1 more source
Building Secure Web Applications [PDF]
In these days of phishing and near-daily announcements of identity theft via large-scale data losses, it seems almost ridiculous to talk about securing the Web. At this point most people seem ready to throw up their hands at the idea or to lock down one small component that they can control in order to keep the perceived chaos at bay.
openaire +1 more source
On the Origins of Toughness in Corymbia calophylla (Marri Tree) Nuts
We uncover the natural toughening mechanisms of the marri nut, including fiber pullout, crack deflection, and a viscoelastic matrix, which enable exceptional energy absorption and ductility comparable to Teflon, with an elastic modulus similar to acrylic.
Wegood M. Awad +7 more
wiley +1 more source
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal +2 more
doaj +1 more source
Grancalcin (GCA), a myeloid‐derived protein, is enriched in gingival tissues of periodontitis patients and mouse models. Through interactions with CD44 and activation of MYH9, GCA promotes NF‐κB signaling and exacerbates periodontal inflammation and bone loss.
Min Zhou +6 more
wiley +1 more source

