Results 41 to 50 of about 58,276 (196)
Regeneration and Herbivory Across Multiple Forest Types Within a Megafire Burn Scar
Human activities are increasing the occurrence of megafires that alter ecological dynamics in forest ecosystems. The objective of this study was to understand the impacts of a 610 km2 megafire on patterns of tree regeneration and herbivory across three ...
Devri A. Tanner +6 more
doaj +1 more source
Image Steganography Analysis Using GOST Algorithm and PRNG Based on LSB
Security in communication is very important for everyone to pay attention to. To prevent data leakage and illegal retrieval of data, cryptography and steganography can be used.
Ilham Firman Ashari +3 more
doaj +1 more source
Frontier Advances of Emerging High‐Entropy Anodes in Alkali Metal‐Ion Batteries
Recent advances in microscopic morphology control of high‐entropy anode materials for alkali metal‐ion batteries. Abstract With the growing demand for sustainable energy, portable energy storage systems have become increasingly critical. Among them, the development of rechargeable batteries is primarily driven by breakthroughs in electrode materials ...
Liang Du +14 more
wiley +1 more source
Wright fishhook cactus is a small globose cactus endemic to an area of 280,000 ha in south-central Utah and was listed as endangered in October of 1979 by the U.S. Fish and Wildlife Service (USFWS).
David Lariviere +3 more
doaj +1 more source
Single‐ and Dual‐Atom Configurations in Atomically Dispersed Catalysts for Lithium–Sulfur Batteries
Single‐atom and dual‐atom‐based atomically dispersed catalysts (ADCs) effectively address the shuttle effect and sluggish redox kinetics in Li–S batteries. With nearly 100% atomic utilization and tunable coordination environments, ADCs enhance LiPSs adsorption, lower conversion barriers, and accelerate sulfur redox reactions.
Haoyang Xu +4 more
wiley +1 more source
An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection
The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to
Setiadi De Rosal Ignatius Moses +1 more
doaj +1 more source
Stenographic Approaches for Enhancing Data Security in Cloud Computing [PDF]
Steganography has become a well-known method for concealing data so that unauthorized users cannot identify it among other data. With the growing popularity of cloud computing, security of cloud databases has become a major problem, and the necessity to ...
Rajguru Sankalp Sudarsan +3 more
doaj +1 more source
Environment, morphology and stellar populations of bulgeless low surface brightness galaxies
Based on the Sloan Digital Sky Survey DR 7, we investigate the environment, morphology and stellar population of bulgeless low surface brightness (LSB) galaxies in a volume-limited sample with redshift ranging from 0.024 to 0.04 and $M_r$ $\leq$ $-18.8$.
Deng, L. C. +7 more
core +2 more sources
The blue compact dwarf galaxy I Zw 18: a comparative study of its low-surface-brightness component [PDF]
(abridged): Using HST and ground-based optical and NIR imaging data, we investigate whether the blue compact dwarf (BCD) galaxy I Zw 18 possesses an extended low-surface-brightness (LSB) old stellar population underlying its star-forming (SF) regions. We
Fricke, K. J. +6 more
core +2 more sources
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source

