Results 91 to 100 of about 783,488 (290)
A low‐cost, portable point‐of‐care platform for rapid Mpox detection using loop‐mediated isothermal amplification is reported. The device integrates fluorescence readout and mobile monitoring. A machine‐learning model analyzes temperature data and correlates thermal changes with DNA concentration, enabling sensitive and reliable molecular diagnosis in ...
Nazente Atceken +4 more
wiley +1 more source
Browser Feature Usage on the Modern Web
Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, open web. We find
Ansari, Lara +3 more
core +1 more source
A volatile‐switching compact model of electrochemical metallization memory cells for neuromorphic architecture is developed and validated by reliable reproduction of device characterization measurements: I−V sweeps, SET kinetics, relaxation dynamics.
Rana Walied Ahmad +4 more
wiley +1 more source
Security Testing of XYZ Website Application Using ISSAF and OWASP WSTG v4.2 Methods
The research focuses on improving the security of information systems in ABC City, specifically on the XYZ website application developed by the Communication and Informatics Office ABC to assist in governmental administration and manage various critical
Muhammad Firdaus Yusuf +3 more
doaj +1 more source
Information Guide: Common Foreign and Security Policy [PDF]
A guide to the European Union’s Common Foreign and Security Policy (CFSP), with hyperlinks to sources of information within European Sources Online and on external ...
Cardiff EDC, .
core +2 more sources
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav +2 more
wiley +1 more source
The Internet provides business with new methods of reaching and interacting with ·customers as well as improving inter and intra business communication. In this research, a soft.ware marketing web site with a security tools is designed and implemented to protect the customer pers.onal information and payment ...
openaire +1 more source
Perancangan dan Implementasi Perangkat Lunak Proxy Tunnel dengan Enkripsi Kunci Simetrisasimetris untuk Manipulasi Paket Data [PDF]
S: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that ...
Gat, G. (Gat)
core
The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley +1 more source
AN INSECURE WILD WEB: A LARGE-SCALE STUDY OF EFFECTIVENESS OF WEB SECURITY MECHANISMS
This research work presents a large-scale study of the problems in real-world web applications and widely-used mobile browsers. Through a large-scale experiment, we find inconsistencies in Secure Socket Layer (SSL) warnings among popular mobile web ...
Kailas Patil
doaj +1 more source

