Results 81 to 90 of about 1,157,333 (342)

AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing

open access: yesAdvanced Materials, EarlyView.
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee   +21 more
wiley   +1 more source

Chemically Doped Conductive Polymers for Wearable Health Monitoring

open access: yesAdvanced Materials Technologies, EarlyView.
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo   +5 more
wiley   +1 more source

Security for Grid Services [PDF]

open access: yes, 2003
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new ...
Bresnahan, John   +9 more
core   +2 more sources

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

open access: yes, 2015
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei   +2 more
core   +2 more sources

The Effect of the Dark Web on the Security [PDF]

open access: diamond, 2021
János Bésenyő, Attila Gulyás
openalex   +1 more source

Web Application Security

open access: yes, 2005
As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only
Foss, Julie-Marie, Ingvaldsen, Nina
openaire   +3 more sources

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]

open access: yes, 2011
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David   +2 more
core   +1 more source

Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook

open access: yesAdvanced Materials Technologies, EarlyView.
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi   +12 more
wiley   +1 more source

From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures

open access: yesAdvanced Robotics Research, EarlyView.
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley   +1 more source

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

Home - About - Disclaimer - Privacy