Results 101 to 110 of about 149,520 (284)

The Elephant Trunk Skin Inspires a Highly Sensitive and Deformable, Yet Robust, Armor Skin

open access: yesAdvanced Science, EarlyView.
The study presents the elephant trunk‐inspired armor skin with tactile sensing (ETATS). The ETATS architecture stretches and compresses while resisting puncture and tear, and it enables optical detection of pressure and lateral strain. Morphology‐based decoupling of strain and pressure paves the way to sensitive and deformable, yet robust, soft‐robotic
Jun Chang Yang   +3 more
wiley   +1 more source

Effort Estimates on Web Application Vulnerability Discovery

open access: yes2013 46th Hawaii International Conference on System Sciences, 2013
Web application vulnerabilities are widely considered a serious concern. However, there are as of yet scarce data comparing the effectiveness of different security countermeasures or detailing the magnitude of the security issues associated with web applications.
Hannes Holm   +2 more
openaire   +3 more sources

A High‐Throughput Live Imaging Platform to Investigate Circuit‐Dependent Regulation of Circadian Rhythms in Brain Tissue

open access: yesAdvanced Science, EarlyView.
Biological rhythms coordinate physiology, from genes to behavior. Study of circadian rhythms in brain tissue is constrained by limited throughput and spatial and temporal information quality. A new platform for high‐throughput, long‐term multiplexed fluorescent live imaging of circadian rhythms in brain slices is introduced.
Marco Ferrari   +3 more
wiley   +1 more source

Security Analysis of Indonesian Region Government Web Applications Based on NIST SP 800-115 and WSTG v4.2

open access: yesJournal of Information Systems and Informatics
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal   +2 more
doaj   +1 more source

Advanced Multiscale Modeling for Revealing Anomalous Fluid Transport Induced by Confinement Interfacial Layer Reconstruction in Sub‐10 nm Space

open access: yesAdvanced Science, EarlyView.
Integrating experimental insights with molecular dynamics simulations, we establish an advanced mathematical model for fluids confined in sub‐10‐nm channels, enabling quantitative prediction of interfacial layer thickness and viscosity by accounting for channel material, temperature, and fluid properties.
Xiang Zhang   +3 more
wiley   +1 more source

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports
The exponential growth of the Internet has led to a dramatic rise in the use of web applications, making them integral to businesses, industries, education, financial institutions, and daily life.
Hajira Bashir   +6 more
doaj   +1 more source

Practical Lithium–Sulfur Batteries: An Integrated Design Roadmap from High‐Loading Cathodes to High‐Energy Pouch Cells

open access: yesAdvanced Science, EarlyView.
This review presents an integrated design roadmap for practical lithium–sulfur batteries, moving beyond isolated material breakthroughs to the synergistic combination of three interdependent frontiers: Scale‐Up, Electrolyte‐Cathode Synergy, and AI/ML Data‐Driven Design.
Shihzad Shakil   +6 more
wiley   +1 more source

Detection & prevention of vulnerabilities in web applications [PDF]

open access: yes, 2019
Web applications allow users to receive and communicate content from remote servers through web browsers. They are becoming the dominant way for users to access online services. Meanwhile, web applications have raised a great many security concerns, to name a few, coding weaknesses, vulnerabilities, and leakage of sensitive data.
openaire   +2 more sources

Inhibitory Decay and Supercritical Brain Dynamics During Sleep Deprivation

open access: yesAdvanced Science, EarlyView.
Sleep deprivation progressively shifts human brain dynamics from near‐critical toward supercritical states, as revealed by neuronal avalanche analysis of resting‐state fMRI. These changes track subjective sleep pressure rather than vigilance lapses and show marked network heterogeneity. A circuit model suggests that reduced inhibitory efficacy provides
Dai Zhang   +6 more
wiley   +1 more source

METHODS OF BLOCKING THE VULNERABILITIES OF THE XSS TYPE BASED ON SERVICE-ORIENTED ARCHITECTURE

open access: yesМіжнародний науково-технічний журнал "Проблеми керування та інформатики"
Web applications are developed in several languages and deployed in various operating systems. This is due to the various functions that the web application provides to its users.
Р.Х. Хамдамов   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy