Results 81 to 90 of about 787,843 (284)

Search-based Tier Assignment for Optimising Offline Availability in Multi-tier Web Applications

open access: yes, 2017
Web programmers are often faced with several challenges in the development process of modern, rich internet applications. Technologies for the different tiers of the application have to be selected: a server-side language, a combination of JavaScript ...
De Koster, Joeri   +3 more
core   +1 more source

Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook

open access: yesAdvanced Materials Technologies, EarlyView.
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi   +12 more
wiley   +1 more source

Implementing security framework of electronic business application [PDF]

open access: yes, 2004
Security is an essential issue in e-commerce. Lack of security knowledge exposed e commerc e customer to threat. Security threat such as viruses, Trojan and malicious software could put customer to danger.
Aman, Hannani
core  

From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures

open access: yesAdvanced Robotics Research, EarlyView.
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley   +1 more source

Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis

open access: yesAdvanced Science, EarlyView.
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu   +4 more
wiley   +1 more source

Secure Development - Web Application Security.

open access: yesIOSR Journal of Computer Engineering, 2013
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire   +1 more source

Building Secure Web Applications [PDF]

open access: yesQueue, 2007
In these days of phishing and near-daily announcements of identity theft via large-scale data losses, it seems almost ridiculous to talk about securing the Web. At this point most people seem ready to throw up their hands at the idea or to lock down one small component that they can control in order to keep the perceived chaos at bay.
openaire   +1 more source

On the Origins of Toughness in Corymbia calophylla (Marri Tree) Nuts

open access: yesAdvanced Science, EarlyView.
We uncover the natural toughening mechanisms of the marri nut, including fiber pullout, crack deflection, and a viscoelastic matrix, which enable exceptional energy absorption and ductility comparable to Teflon, with an elastic modulus similar to acrylic.
Wegood M. Awad   +7 more
wiley   +1 more source

Security Analysis of Indonesian Region Government Web Applications Based on NIST SP 800-115 and WSTG v4.2

open access: yesJournal of Information Systems and Informatics
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal   +2 more
doaj   +1 more source

Myeloid‐Derived Grancalcin Promotes Periodontal Inflammation and Pathological Bone Remodeling in Periodontitis

open access: yesAdvanced Science, EarlyView.
Grancalcin (GCA), a myeloid‐derived protein, is enriched in gingival tissues of periodontitis patients and mouse models. Through interactions with CD44 and activation of MYH9, GCA promotes NF‐κB signaling and exacerbates periodontal inflammation and bone loss.
Min Zhou   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy