Results 101 to 110 of about 391,871 (286)

Single‐ and Dual‐Atom Configurations in Atomically Dispersed Catalysts for Lithium–Sulfur Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Single‐atom and dual‐atom‐based atomically dispersed catalysts (ADCs) effectively address the shuttle effect and sluggish redox kinetics in Li–S batteries. With nearly 100% atomic utilization and tunable coordination environments, ADCs enhance LiPSs adsorption, lower conversion barriers, and accelerate sulfur redox reactions.
Haoyang Xu   +4 more
wiley   +1 more source

Algorithmic Design of Disordered Networks With Arbitrary Coordination: Application to Biophotonics

open access: yesAdvanced Functional Materials, EarlyView.
Predictive Design of Disordered Networks: Disordered network‐like morphologies are abundant in nature, from cytoskeletal networks to bone structures and chalcogenide glasses. These structures are naturally hard to characterize. A new algorithmic tool extends the established Wooten–Weaire–Winer (WWW) algorithm to valencies above 4.
Florin Hemmann   +3 more
wiley   +1 more source

Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems

open access: yesAdvanced Functional Materials, EarlyView.
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley   +1 more source

GAN-based patient information hiding for an ECG authentication system. [PDF]

open access: yesBiomed Eng Lett, 2023
Kang Y   +7 more
europepmc   +1 more source

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]

open access: yes, 2015
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin   +5 more
core   +1 more source

Perfectly secure steganography: hiding information in the quantum noise of a photograph

open access: yes, 2015
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan   +4 more
core   +2 more sources

Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley   +1 more source

Integrated Association Rules Complete Hiding Algorithms

open access: yesAdvances in Electrical and Electronic Engineering, 2017
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy