Results 41 to 50 of about 58,647 (231)
Regeneration and Herbivory Across Multiple Forest Types Within a Megafire Burn Scar
Human activities are increasing the occurrence of megafires that alter ecological dynamics in forest ecosystems. The objective of this study was to understand the impacts of a 610 km2 megafire on patterns of tree regeneration and herbivory across three ...
Devri A. Tanner +6 more
doaj +1 more source
Additive Gaussian Process Regression for Predictive Design of High‐Performance, Printable Silicones
A chemistry‐aware design framework for tuning printable polydimethylsiloxane (PDMS) for vat photopolymerization (VPP) is developed using additive Gaussian process (GP) modeling. Polymer network mechanics informs variable groupings, feasible formulation constraints, and interaction variables.
Roxana Carbonell +3 more
wiley +1 more source
Wright fishhook cactus is a small globose cactus endemic to an area of 280,000 ha in south-central Utah and was listed as endangered in October of 1979 by the U.S. Fish and Wildlife Service (USFWS).
David Lariviere +3 more
doaj +1 more source
The Effects of Starburst Activity on Low Surface Brightness Disk Galaxies
Although numerous simulations have been done to understand the effects of intense bursts of star formation on high surface brightness galaxies, few attempts have been made to understand how localized starbursts would affect both the color and surface ...
Dalcanton J. J. +11 more
core +1 more source
This paper presents a novel approach to reducing oxide layers on metal powders using low‐temperature hydrogen dielectric barrier discharge plasmas at atmospheric pressure. Unlike conventional hydrogen‐plasma reductions, the powders do not contact the plasma directly.
Shukang Zhang +3 more
wiley +1 more source
An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection
The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to
Setiadi De Rosal Ignatius Moses +1 more
doaj +1 more source
Stenographic Approaches for Enhancing Data Security in Cloud Computing [PDF]
Steganography has become a well-known method for concealing data so that unauthorized users cannot identify it among other data. With the growing popularity of cloud computing, security of cloud databases has become a major problem, and the necessity to ...
Rajguru Sankalp Sudarsan +3 more
doaj +1 more source
An Investigation for Steganography using Different Color System [PDF]
Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet.In this paper, Least Significant Bit LSB-based Steganographic ...
Amira Sallow, Zahraa Taha, Ahmed Nori
doaj +1 more source
Kriptografi dan steganografi adalah teknik yang digunakan untuk mengamankan data untuk meminimalkan pencurian data dan akses oleh orang yang tidak berwenang.
Ibnu Utomo Wahyu Mulyono +2 more
doaj +1 more source
Single‐ and Dual‐Atom Configurations in Atomically Dispersed Catalysts for Lithium–Sulfur Batteries
Single‐atom and dual‐atom‐based atomically dispersed catalysts (ADCs) effectively address the shuttle effect and sluggish redox kinetics in Li–S batteries. With nearly 100% atomic utilization and tunable coordination environments, ADCs enhance LiPSs adsorption, lower conversion barriers, and accelerate sulfur redox reactions.
Haoyang Xu +4 more
wiley +1 more source

