Results 61 to 70 of about 967,964 (329)
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
A circular route, involving upcycling of waste surgical masks, affords a Mn‐based layered carbide with porosity, redox activity and low work function. These features enable its effective operation as positive supercapacitor electrode in an aqueous asymmetric supercapacitor delivering 213 Wh L−1 energy density.
Debabrata Nandi +7 more
wiley +1 more source
The rapid development of network technology makes the world enter a new era, but it also brings a variety of severe information security problems, which makes the network security more and more important. Based on the existing literature and information,
Wenyan Deng, Pengfei Yan
doaj +1 more source
FP-tree and COFI Based Approach for Mining of Multiple Level Association Rules in Large Databases
In recent years, discovery of association rules among itemsets in a large database has been described as an important database-mining problem. The problem of discovering association rules has received considerable research attention and several ...
Kumar, Parveen +2 more
core +1 more source
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian +8 more
wiley +1 more source
PERANCANGAN DAN IMPLEMENTASI MIDDLEWARE UNTUK PENGINTEGRASIAN SECURITY GATE DENGAN SLIMS [PDF]
Perkembangan teknologi yang semakin pesat membuat posisi sistem barcode mulai tergantikan oleh RFID. Dalam dunia pendidikan, RFID mulai banyak diterapkan di perpustakaan, salah satunya perpustakaan Universitas Syiah Kuala. Salah satu penerapan RFID dalam
Afdhal
core
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
Bioprinting Organs—Science or Fiction?—A Review From Students to Students
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu +18 more
wiley +1 more source
ORACLE DATABASE SECURITY [PDF]
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core
Magnetic Ion Channel Activation (MICA) enables remote stimulation of mechanosensitive ion channels using functionalised magnetic nanoparticles, enhancing extracellular vesicle (EV) biogenesis is pre‐osteoblasts. MICA desrived EVs exhibit typical nano‐vesicular characteristics but display superior pro‐osteogeneic activity, promoting mesenchymal stem ...
Afeesh Rajan Unnithan +9 more
wiley +1 more source

