Results 91 to 100 of about 136,963 (275)
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous ...
H.Chen, H.Wang, R.Roman
core +1 more source
Advanced Technologies for Characterizing and Detecting Battery Thermal Failure: A Review
Illustration of advanced characterization techniques to predict battery thermal failure. ABSTRACT Energy storage is essential in accelerating the global transition toward clean and sustainable energy across various sectors. Lithium‐ion batteries (LIBs) have become increasingly significant for energy storage due to their high energy density, low ...
Yongxiu Chen +5 more
wiley +1 more source
Orally administered polystyrene microplastics accumulate in murine tissues and are detected using MALDI‐MSI with TIMS. Lipid profiling reveals decreases in hexosylceramides, sphingomyelins, and ether‐linked phospholipids, indicating altered metabolism.
Karina A. Vargas +5 more
wiley +2 more sources
A steric‐hindrance molecular engineering strategy uses dimethyl maleate (DMM) to convert poly(1,4‐butanediol) bis(4‐aminobenzoate) (PBDAB) into a precursor with reduced reactivity via Michael addition, thereby retarding the curing process to form a transparent, ultraflexible, and self‐healable secondary‑amine polyurea (PuSA) with a crosslinked network.
Sinan Zheng +10 more
wiley +1 more source
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam +22 more
core +1 more source
Tensile‐strained bismuth nanosheets (TS‐BiNs) achieve a formate Faradaic efficiency of 92% at −1000 mA cm−2 and enable stable production of pure formic acid (HCOOH) in a solid‐state electrolyte reactor. Theoretical calculations reveal that the introduced strain lowers the energy barrier for *OCHO intermediate formation, fundamentally enhancing the ...
Shiqi Li +16 more
wiley +1 more source
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj
Ferromagnetic Resonance Response of bcc Fe60V40 Layers Generated from Short‐Range Ordered Precursors
ABSTRACT Layers of body‐centered cubic (bcc) Fe60V40 are generated in short‐range ordered (SRO) Fe60V40 precursors through atomic displacements caused by the irradiation of light noble gas ions. The structural change leads to the onset of ferromagnetism confined to the bcc layers. Here, the variation of ferromagnetic resonance response as a function of
Md. Shadab Anwar +9 more
wiley +1 more source
Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon +6 more
core
Research Progress and Applications of Non‐Carrier‐Injection Electroluminescence
Non‐carrier‐injection electroluminescence (NCI‐EL) uses AC fields and displacement currents to trigger light from internal charge reservoirs, enabling minimalist emitters with remotely coupled terminals. This review maps shared mechanisms across organics, GaN, quantum dots, and TMDCs, compares planar, interdigital, single‐terminal, and coaxial designs,
Wei Huang +6 more
wiley +1 more source

