Results 81 to 90 of about 1,157,333 (342)
AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee +21 more
wiley +1 more source
Chemically Doped Conductive Polymers for Wearable Health Monitoring
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo +5 more
wiley +1 more source
Security for Grid Services [PDF]
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new ...
Bresnahan, John +9 more
core +2 more sources
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources
The Effect of the Dark Web on the Security [PDF]
János Bésenyő, Attila Gulyás
openalex +1 more source
As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only
Foss, Julie-Marie, Ingvaldsen, Nina
openaire +3 more sources
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi +12 more
wiley +1 more source
From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley +1 more source
Web development evolution: the business perspective on security [PDF]
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M. +2 more
core

