Results 91 to 100 of about 136,963 (275)

An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

open access: yes, 2012
With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous ...
H.Chen, H.Wang, R.Roman
core   +1 more source

Advanced Technologies for Characterizing and Detecting Battery Thermal Failure: A Review

open access: yesAdvanced Science, EarlyView.
Illustration of advanced characterization techniques to predict battery thermal failure. ABSTRACT Energy storage is essential in accelerating the global transition toward clean and sustainable energy across various sectors. Lithium‐ion batteries (LIBs) have become increasingly significant for energy storage due to their high energy density, low ...
Yongxiu Chen   +5 more
wiley   +1 more source

Spatial Detection of Microsphere Polystyrene Plastics and Molecular Remodeling within a Full‐Body Mouse with MALDI Trapped Ion Mobility Mass Spectrometry Imaging

open access: yesAngewandte Chemie, EarlyView.
Orally administered polystyrene microplastics accumulate in murine tissues and are detected using MALDI‐MSI with TIMS. Lipid profiling reveals decreases in hexosylceramides, sphingomyelins, and ether‐linked phospholipids, indicating altered metabolism.
Karina A. Vargas   +5 more
wiley   +2 more sources

In Situ Polyurea Integration for Self‐Healing, Durable Transparent Electromagnetic‐Interference Shielding Film

open access: yesAdvanced Science, EarlyView.
A steric‐hindrance molecular engineering strategy uses dimethyl maleate (DMM) to convert poly(1,4‐butanediol) bis(4‐aminobenzoate) (PBDAB) into a precursor with reduced reactivity via Michael addition, thereby retarding the curing process to form a transparent, ultraflexible, and self‐healable secondary‑amine polyurea (PuSA) with a crosslinked network.
Sinan Zheng   +10 more
wiley   +1 more source

Preserving Both Privacy and Utility in Network Trace Anonymization

open access: yes, 2018
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam   +22 more
core   +1 more source

Efficient Electrocatalytic Conversion of CO2 to Pure Formic Acid Solutions via Strain‐Engineered Bismuth Nanosheets

open access: yesAdvanced Science, EarlyView.
Tensile‐strained bismuth nanosheets (TS‐BiNs) achieve a formate Faradaic efficiency of 92% at −1000 mA cm−2 and enable stable production of pure formic acid (HCOOH) in a solid‐state electrolyte reactor. Theoretical calculations reveal that the introduced strain lowers the energy barrier for *OCHO intermediate formation, fundamentally enhancing the ...
Shiqi Li   +16 more
wiley   +1 more source

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj  

Ferromagnetic Resonance Response of bcc Fe60V40 Layers Generated from Short‐Range Ordered Precursors

open access: yesAdvanced Electronic Materials, EarlyView.
ABSTRACT Layers of body‐centered cubic (bcc) Fe60V40 are generated in short‐range ordered (SRO) Fe60V40 precursors through atomic displacements caused by the irradiation of light noble gas ions. The structural change leads to the onset of ferromagnetism confined to the bcc layers. Here, the variation of ferromagnetic resonance response as a function of
Md. Shadab Anwar   +9 more
wiley   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Research Progress and Applications of Non‐Carrier‐Injection Electroluminescence

open access: yesAdvanced Electronic Materials, EarlyView.
Non‐carrier‐injection electroluminescence (NCI‐EL) uses AC fields and displacement currents to trigger light from internal charge reservoirs, enabling minimalist emitters with remotely coupled terminals. This review maps shared mechanisms across organics, GaN, quantum dots, and TMDCs, compares planar, interdigital, single‐terminal, and coaxial designs,
Wei Huang   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy