Zinc(II) coordination complexes with tunable aryloxy‐imine ligands exhibit controllable supramolecular self‐assembly into hierarchical fibrous structures. Coordination‐driven stacking, not π–π interactions, enables gelation, dynamic assembly/disassembly, and enhanced nanomechanical properties.
Merlin R. Stühler +10 more
wiley +1 more source
Linking Local Atomic Structure and Carbon Network Architecture to Electrochemical Performance and Na<sup>+</sup> Diffusivity in Na<sub>4</sub>VMn(PO<sub>4</sub>)<sub>3</sub>/C Cathodes. [PDF]
Kaewmala S +7 more
europepmc +1 more source
Biomass Native Structure Into Functional Carbon‐Based Catalysts for Fenton‐Like Reactions
This study indicates that eight biomasses with 2D flaky and 1D acicular structures influence surface O types, morphology, defects, N doping, sp2 C, and Co nanoparticles loading in three series of carbon, N‐doped carbon, and cobalt/graphitic carbon. This work identifies how these structural factors impact catalytic pathways, enhancing selective electron
Wenjie Tian +7 more
wiley +1 more source
LensPlus: a high space-bandwidth optical imaging technique. [PDF]
Goswami N, Anastasio MA.
europepmc +1 more source
Can the success of digital super-resolution networks be transferred to passive all-optical systems? [PDF]
Kleiner M, Michaeli L, Michaeli T.
europepmc +1 more source
High-Strength 3D-Ordered Ceramic-Gel Composite Electrolytes Enable Highly Stable Sodium Metal Batteries at - 20 to 60 °C. [PDF]
Shen L +8 more
europepmc +1 more source
Alveolar Bone Segmentation Methods in Assessing the Effectiveness of Periodontal Defect Regeneration Through Machine Learning of CBCT Data: A Systematic Review. [PDF]
Mohammed M +4 more
europepmc +1 more source
Patterns of Avian Frugivory in Beijing's Urban Forest Across Multiple Temporal Scales. [PDF]
Liu X +5 more
europepmc +1 more source
Related searches:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), 2021Due to the wide deployment of deep learning applications in safety-critical systems, robust and secure execution of deep learning workloads is imperative. Adversarial examples, where the inputs are carefully designed to mislead the machine learning model is among the most challenging attacks to detect and defeat.
Xingbin Wang +5 more
openaire +1 more source

