Results 51 to 60 of about 1,157,333 (342)

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Digital Actuation Control of Soft Robotic Origami With Self‐Folding Liquid Crystal Elastomer Hinges

open access: yesAdvanced Functional Materials, EarlyView.
Self‐folding soft‐rigid hybrid robotic origami is enabled by liquid crystal elastomer actuators with embedded Joule heating and closed‐loop digital control. Digitally addressable hinges provide reversible and programmable transitions between distinct folded states while maintaining actuation performance at high cycle counts (over 1500).
David C. Bershadsky   +3 more
wiley   +1 more source

Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval

open access: yesIEEE Access
Website clicks that redirect Android-phone users to malicious websites with fake virus alerts or phishing attacks are increasing exponentially. Although a uniform resource locator (URL) blocklist is considered a suitable countermeasure to such attacks ...
Toshihiro Yamauchi   +3 more
doaj   +1 more source

Imaging of Biphoton States: Fundamentals and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley   +1 more source

Research on the SQL injection filtering based on SQL syntax tree

open access: yes网络与信息安全学报, 2016
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN,Hui LIN,Chuan HUANG
doaj   +1 more source

3PAC: Enforcing Access Policies for Web Services [PDF]

open access: yes, 2005
Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.
Bemmel, J. van   +2 more
core   +2 more sources

Bio‐Inspired Molecular Events in Poly(Ionic Liquids)

open access: yesAdvanced Functional Materials, EarlyView.
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley   +1 more source

Penerapan Laravel untuk Mengatasi Kelemahan Keamanan WordPress pada Website Badan Layanan Umum Daerah

open access: yesJurnal Saintekom
The BLUD.co.id website was previously developed using the Content Management System (CMS) WordPress, but it encountered security issues in the form of URL redirect attacks that directed users to untrusted sites.
Muhammad Sholeh   +2 more
doaj   +1 more source

From Clinic to Computation: Multiscale Bioengineering Strategies for Durable Biological Aortic Valve Replacements

open access: yesAdvanced Functional Materials, EarlyView.
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco   +7 more
wiley   +1 more source

Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms

open access: yesТехнічна інженерія
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy