Single‐ and Dual‐Atom Configurations in Atomically Dispersed Catalysts for Lithium–Sulfur Batteries
Single‐atom and dual‐atom‐based atomically dispersed catalysts (ADCs) effectively address the shuttle effect and sluggish redox kinetics in Li–S batteries. With nearly 100% atomic utilization and tunable coordination environments, ADCs enhance LiPSs adsorption, lower conversion barriers, and accelerate sulfur redox reactions.
Haoyang Xu +4 more
wiley +1 more source
Algorithmic Design of Disordered Networks With Arbitrary Coordination: Application to Biophotonics
Predictive Design of Disordered Networks: Disordered network‐like morphologies are abundant in nature, from cytoskeletal networks to bone structures and chalcogenide glasses. These structures are naturally hard to characterize. A new algorithmic tool extends the established Wooten–Weaire–Winer (WWW) algorithm to valencies above 4.
Florin Hemmann +3 more
wiley +1 more source
Steganography in IoT: Information Hiding with Joystick and Touch Sensors. [PDF]
Koptyra K, Ogiela MR.
europepmc +1 more source
Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley +1 more source
GAN-based patient information hiding for an ECG authentication system. [PDF]
Kang Y +7 more
europepmc +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
Perfectly secure steganography: hiding information in the quantum noise of a photograph
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan +4 more
core +2 more sources
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
Integrated Association Rules Complete Hiding Algorithms
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah +3 more
doaj +1 more source
Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping. [PDF]
Huang CT, Lin CY, Weng CY.
europepmc +1 more source

