Results 71 to 80 of about 390,993 (284)

Ultrahigh‐Yield, Multifunctional, and High‐Performance Organic Memory for Seamless In‐Sensor Computing Operation

open access: yesAdvanced Functional Materials, EarlyView.
Molecular engineering of a nonconjugated radical polymer enables a significant enhancement of the glass transition temperature. The amorphous nature and tunability of the polymer, arising from its nonconjugated backbone, facilitates the fabrication of organic memristive devices with an exceptionally high yield (>95%), as well as substantial ...
Daeun Kim   +14 more
wiley   +1 more source

New secure QIM-based information hiding algorithms [PDF]

open access: yesКомпьютерная оптика, 2018
The paper proposes two information hiding algorithms for multimedia based on Quantization Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical attack which is able to restore a secret key using the correlation between ...
Vitaly Mitekin, Victor Fedoseev
doaj   +1 more source

Gram‐Scale Production of Iron Oxide Rubik‐Cube Nanoparticles: New Tools for the Clinical Translation of Magnetic Hyperthermia and Magnetic Particle Imaging

open access: yesAdvanced Functional Materials, EarlyView.
This work reports the first gram‐scale solvothermal synthesis of ‘Rubik's cube’ nanoparticles—cubic, dendritic multicore structures with tuneable sizes and exceptional magnetic heating performance. Featuring iron oxide single‐domain character, with low coercivity fields, high magnetization, and strong MPI signals, they enable viscosity‐independent ...
Giusy M. R. Rizzo   +12 more
wiley   +1 more source

Information Hiding Over Mobile using Bluetooth [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2013
Due to the evolution of massive means of communication and the exchange of information has become personal privacy vulnerable to abuse more easily than ever before, so there is a need to adopt the technology more sophisticated and more secret and ...
doaj   +1 more source

Code fusion information-hiding algorithm based on PE file function migration

open access: yesEURASIP Journal on Image and Video Processing, 2021
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding ...
Zuwei Tian, Hengfu Yang
doaj   +1 more source

Information Hiding using Steganography

open access: yesInternational Journal of Engineering and Advanced Technology, 2020
The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed ...
Ritu Sindhu, Pragati Singh
openaire   +1 more source

Enhancing Synaptic Plasticity and Multistate Retention of Organic Neuromorphic Devices Using Anion‐Excessive Gel Electrolyte

open access: yesAdvanced Functional Materials, EarlyView.
Anion‐excessive gel‐based organic synaptic transistors (AEG‐OSTs) that can maintain electrical neutrality are developed to enhance synaptic plasticity and multistate retention. Key improvement is attributed to the maintenance of electrical neutrality in the electrolyte even after electrochemical doping, which reduces the Coulombic force acting on ...
Yousang Won   +3 more
wiley   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

Universal Electronic‐Structure Relationship Governing Intrinsic Magnetic Properties in Permanent Magnets

open access: yesAdvanced Functional Materials, EarlyView.
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley   +1 more source

Review of information hiding on Chinese text

open access: yesTongxin xuebao, 2019
Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing ...
Guohua WU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy