Results 61 to 70 of about 392,009 (311)

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor

open access: yesIEEE Access, 2020
Aiming at the problem that the embedded capacity and security of the single-carrier information hiding algorithm can not be further improved because of the number of carriers, the carrier pre-processing and the embedding of secret information are ...
Shuai Ren   +4 more
doaj   +1 more source

The correlation analysis between organizational justice, knowledge‐hiding behaviour and Nurses' innovation ability: A cross‐sectional study

open access: yesNursing Open, 2023
Aim The aim of the study was to analyse the correlations among organizational justice, knowledge‐hiding behaviour and nurses' innovation ability. Design A descriptive and cross‐sectional design and the data were collected using questionnaires.
Jiating Song   +3 more
doaj   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Selective Redundancy Removal: A Framework for Data Hiding

open access: yesFuture Internet, 2010
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs.
Ugo Fiore
doaj   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Quantum Steganography

open access: yes, 2010
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core   +1 more source

Bimetallic Nanoparticles as Cocatalysts for Photocatalytic Hydrogen Production

open access: yesAdvanced Functional Materials, EarlyView.
Recent developments have introduced bimetallic nanoparticles as effective cocatalysts for photocatalytic systems. This review explores the rapidly expanding research on bimetallic cocatalysts for photocatalytic production of hydrogen, emphasizing the creation of carrier‐selective contacts, localized surface plasmon resonance effects, methodologies for ...
Yufen Chen   +4 more
wiley   +1 more source

Information hiding based on Augmented Reality

open access: yesMathematical Biosciences and Engineering, 2019
Information hiding aims to achieve secret communication via certain carrier. However, these carrier-based methods often have different kinds of deficiencies.
Chuanlong Li , Xingming Sun, Yuqian Li
doaj   +1 more source

Information Hiding Based on Chan-Vese Algorithm [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is ...
Samia Sh. Lazar, Nadia M. Mohammed
doaj   +1 more source

Home - About - Disclaimer - Privacy