Results 41 to 50 of about 45,447 (293)
Black Women in the Labor Movement: Interviews with Clara Day & Johnnie Jackson [PDF]
[Excerpt] Labor unions, like all other institutions in our society, have participated in the racial and sexual discrimination which has made life so difficult for blacks and women. Yet black women are among the strongest and most consistent supporters of
core +1 more source
The tidal deformability of a self-gravitating object leaves an imprint on the gravitational-wave signal of an inspiral which is paramount to measure the internal structure of the binary components.
Maselli, Andrea, Pani, Paolo
core +1 more source
Investigating on Black Holes in Segment Routing Networks: Identification and Detection
Network Black Holes (BHs) are logical failures that create a service disruption for a subset of traffic flows, generally due to device misconfiguration. Detection of a BH is a hard task due to its specific nature: the infrastructure is up and the disconnection affects a limited number of flows.
Marco Polverini+5 more
openaire +1 more source
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du+11 more
wiley +1 more source
Black-hole solution without curvature singularity and closed timelike curves
With a prescribed Coulomb-type energy-momentum tensor, an exact solution of the Einstein field equations over a nonsimply-connected manifold is presented. This spherically symmetric solution has neither curvature singularities nor closed timelike curves.
Klinkhamer, F. R.
core +1 more source
A Review on Black Hole Attack in Mobile Adhoc Network
Mobile ad hoc network is selfconfiguring and infrastructure less network. Due to its dynamic nature, it is more susceptible to severe type of attacks. An assortment of attacks is there to mischief the dexterous working of MANET. One of these attacks is the Black Hole attack which leads to dropping of messages.
Vimal Dhote, Jyoti Sondhi, Anand Motwani
openaire +2 more sources
Engineering Strategies for 2D Layered Tin Halide Perovskite Field‐Effect Transistors
2D halide perovskites are promising candidates for field‐effect transistor (FET) applications due to their high stability and suppressed ion migration in the presence of bulky organic spacers. This review systematically summarizes the optimization engineering strategies of 2D perovskite FETs and future challenges, which provide guidance for developing ...
Shuanglong Wang+4 more
wiley +1 more source
Poly(heptazine) imides (PHIs), a crystalline carbon nitride subclass, intercalate metals to deliver high stability, tunable electronics, and efficient charge separation. These features enable solar‐driven applications such as hydrogen evolution, CO₂ reduction, and organic synthesis.
Gabriel A. A. Diab+6 more
wiley +1 more source
Critical Phenomena in Neutron Stars II: Head-on Collisions
We consider the head-on collision of equal-mass neutron stars boosted towards each other and we study the behavior of such systems near the threshold of black-hole formation.
Kellermann, Thorsten+2 more
core +4 more sources
Synchronized stationary clouds in a static fluid
The existence of stationary bound states for the hydrodynamic velocity field between two concentric cylinders is established. We argue that rotational motion, together with a trapping mechanism for the associated field, is sufficient to mitigate energy ...
Benone, Carolina L.+3 more
core +1 more source