Results 121 to 130 of about 3,073,944 (343)
This review explores Zn anode challenges in aqueous ZIBs, including dendrites, corrosion, and side reactions, and discusses strategies for improvement through Zn anode, electrolyte, and separator modifications to enhance stability and efficiency. Abstract Aqueous rechargeable zinc‐ion batteries (ZIBs) are emerging as promising candidates for next ...
Pragati A. Shinde +5 more
wiley +1 more source
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
doaj +1 more source
Data Security Management in Distributed Computer Systems [PDF]
Adi Armoni
openalex +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Deep-learning-based multiple label chest X-ray classification has achieved significant success, but existing models still have three main issues: fixed-scale convolutions fail to capture both large and small lesions, standard pooling is lacking in the ...
Kangzhe Xiong +4 more
doaj +1 more source
Data security is crucial for Japanese science [PDF]
Eitaka Tsuboi +4 more
openalex +1 more source
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities
Critical Infrastructures (CIs), such as smart power grids, transport systems, and financial infrastructures, are more and more vulnerable to cyber threats, due to the adoption of commodity computing facilities. Despite the use of several monitoring tools,
Aniello, L. +10 more
core
Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz +10 more
wiley +1 more source
Triple Passivation Treatment (TPT) strategy enables 1.75 eV wide‐bandgap perovskite solar cells (WB‐PSCs) with suppressed halide phase segregation and n‐to‐p type surface transition. The photoluminescence quantum yield increases from 0.5 to 2.1%, indicating reduced non‐radiative losses.
Siming Huang +12 more
wiley +1 more source

