Results 91 to 100 of about 783,488 (290)

Machine Learning‐Augmented Loop‐Mediated Isothermal Amplification‐Enabled Point‐of‐Care for Mpox‐Specific Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
A low‐cost, portable point‐of‐care platform for rapid Mpox detection using loop‐mediated isothermal amplification is reported. The device integrates fluorescence readout and mobile monitoring. A machine‐learning model analyzes temperature data and correlates thermal changes with DNA concentration, enabling sensitive and reliable molecular diagnosis in ...
Nazente Atceken   +4 more
wiley   +1 more source

Browser Feature Usage on the Modern Web

open access: yes, 2016
Modern web browsers are incredibly complex, with millions of lines of code and over one thousand JavaScript functions and properties available to website authors. This work investigates how these browser features are used on the modern, open web. We find
Ansari, Lara   +3 more
core   +1 more source

Compact Modeling of Volatile‐Switching Electrochemical Metallization Memory Cells by Means of the Electromotive Force

open access: yesAdvanced Intelligent Systems, EarlyView.
A volatile‐switching compact model of electrochemical metallization memory cells for neuromorphic architecture is developed and validated by reliable reproduction of device characterization measurements: I−V sweeps, SET kinetics, relaxation dynamics.
Rana Walied Ahmad   +4 more
wiley   +1 more source

Security Testing of XYZ Website Application Using ISSAF and OWASP WSTG v4.2 Methods

open access: yesTeknika
The research focuses on improving the security of information systems in ABC City, specifically on the XYZ website application developed by the Communication and Informatics Office ABC to assist in governmental administration and manage various critical
Muhammad Firdaus Yusuf   +3 more
doaj   +1 more source

Information Guide: Common Foreign and Security Policy [PDF]

open access: yes, 2013
A guide to the European Union’s Common Foreign and Security Policy (CFSP), with hyperlinks to sources of information within European Sources Online and on external ...
Cardiff EDC, .
core   +2 more sources

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

Secure Marketing Website

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
The  Internet  provides business  with  new methods of reaching  and interacting with ·customers as  well as  improving inter  and  intra  business communication. In  this  research, a  soft.ware  marketing web  site  with  a security tools   is  designed  and   implemented  to  protect   the  customer  pers.onal information  and   payment ...
openaire   +1 more source

Perancangan dan Implementasi Perangkat Lunak Proxy Tunnel dengan Enkripsi Kunci Simetrisasimetris untuk Manipulasi Paket Data [PDF]

open access: yes, 2011
S: The authors conducted a study on wiretapping in computer networks because of it is very disturbing security and comfort in the surf. Therefore the writer create a proxy tunnel software with symmetric and asymmetric encryption as a security agent that ...
Gat, G. (Gat)
core  

The rain feels different under the same umbrella: Experiences with poverty across LGBTQ subgroups

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Population‐based survey data have demonstrated that LGBTQ communities report varying rates of economic insecurity, yet very little research directly assesses how pathways into and experiences with poverty look different among subgroups at the intersections of sexual orientation and gender identity (SOGI).
Bianca D. M. Wilson, Lillian Nguyen
wiley   +1 more source

AN INSECURE WILD WEB: A LARGE-SCALE STUDY OF EFFECTIVENESS OF WEB SECURITY MECHANISMS

open access: yesICTACT Journal on Communication Technology, 2017
This research work presents a large-scale study of the problems in real-world web applications and widely-used mobile browsers. Through a large-scale experiment, we find inconsistencies in Secure Socket Layer (SSL) warnings among popular mobile web ...
Kailas Patil
doaj   +1 more source

Home - About - Disclaimer - Privacy