Results 61 to 70 of about 437,490 (308)
Melt Grafting of Geometry‐Tailored Voltage Stabilizers for High‐Performance Polypropylene Insulation
A scalable one‐step melt grafting strategy is developed to enhance the dielectric properties of isotactic polypropylene by covalently incorporating thermally stable aromatic voltage stabilizers. This solvent‐free approach improves volume resistivity and DC breakdown strength through deep trap formation and charge localization, offering a sustainable ...
Nazirul Mubin bin Normansah +9 more
wiley +1 more source
An algorithm for using a cross-platform mobile application to protect information in cloud storage
Objective. A high-quality "cloud storage" of data should ensure the confidentiality, integrity and availability of information in the "storage". The use of "cloud storage" for storing information in backups is associated with their possible loss ...
A. R. Gazizov
doaj +1 more source
TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure Codes
Our paper presents solutions using erasure coding, parallel connections to storage cloud and limited chunking (i.e., dividing the object into a few smaller segments) together to significantly improve the delay performance of uploading and downloading ...
Kozat, Ulas C., Liang, Guanfeng
core +1 more source
A novel approach for the design of functional semiconductors is presented, which utilizes the excellent optoelectronic properties of layered hybrid perovskites and the possibility to introduce a molecular photoswitch as the organic spacer. This concept is successfully demonstrated on a coumarin‐based system with the possibility to change the bandgap ...
Oliver Treske +4 more
wiley +1 more source
Dew Computing and Asymmetric Security Framework for Big Data File Sharing
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a
Parinya Suwansrikham +3 more
doaj +1 more source
Securely Outsourcing Large Scale Eigen Value Problem to Public Cloud
Cloud computing enables clients with limited computational power to economically outsource their large scale computations to a public cloud with huge computational power.
Aktar, Shamminuj +2 more
core +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Cache policies for cloud-based systems: To keep or not to keep
In this paper, we study cache policies for cloud-based caching. Cloud-based caching uses cloud storage services such as Amazon S3 as a cache for data items that would have been recomputed otherwise.
Neumann, Christoph +2 more
core +1 more source
Frontier Advances of Emerging High‐Entropy Anodes in Alkali Metal‐Ion Batteries
Recent advances in microscopic morphology control of high‐entropy anode materials for alkali metal‐ion batteries. Abstract With the growing demand for sustainable energy, portable energy storage systems have become increasingly critical. Among them, the development of rechargeable batteries is primarily driven by breakthroughs in electrode materials ...
Liang Du +14 more
wiley +1 more source
Tin hexathiophosphate memristors leverage intrinsic nanopores together with a guided filament formation strategy to regulate titanium ion motion and switching behavior. The devices support reliable nonvolatile memory and reconfigurable logic‐in‐memory, demonstrating 14 Boolean logic functions in a single cell.
Thaw Tint Te Tun +7 more
wiley +1 more source

