Results 91 to 100 of about 186,948 (311)
Designing stable Ru nanoparticle catalyst remains a critical challenge in electrochemical applications. Here, a strategy is presented to stabilize Ru catalysts by leveraging Ce‐doped ZrO2 supports (ZrCeO2‐x), which enhance catalyst durability and activity through electronic metal‐support interactions and stabilized oxygen vacancies.
Mansu Kim+9 more
wiley +1 more source
The pre‐internalization phase of endocytosis remains poorly characterized at single‐cell levels. Single‐cell pre‐internalization mechanics are investigated using advanced robotic techniques. Cancer cells exhibit biphasic adhesion – rapid initial binding followed by reinforcement – while fibroblasts show gradual engagement.
Houari Bettahar+6 more
wiley +1 more source
Rapid Diagnostics of Reconfigurable Intelligent Surfaces Using Space‐Time‐Coding Modulation
A fast reconfigurable‐intelligent‐surface (RIS) diagnostics method is proposed based on spatio‐temporal modulation with orthogonal codes. Theoretical analysis demonstrates a clear distinction in code channel power between normal and faulty elements. Simulations validate its feasibility under high fault ratios and varying receiving angles.
Yi Ning Zheng+7 more
wiley +1 more source
Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks [PDF]
Ju-Sung Kang+5 more
openalex +1 more source
Porous 3D copper scaffold‐based interdigitated electrodes are developed via dynamic hydrogen bubble templating, enabling high‐performance Zn‐ion micro‐batteries and micro‐supercapacitors. This strategy significantly boosts charge storage performance, advancing the design of next‐generation on‐chip energy storage systems.
Nibagani Naresh+7 more
wiley +1 more source
Satellite Network Security Routing Technology Based on Deep Learning and Trust Management. [PDF]
Liu Z, Rong J, Jiang Y, Zhang L.
europepmc +1 more source
SDN and Network Security [PDF]
This paper explores Software Defined Networking (SDN), detailing its architecture, components, and advantages over traditional network infrastructures. It also examines the security vulnerabilities inherent in SDN systems and strategies for their mitigation.
Adriano Bubnjek+2 more
openaire +1 more source
This study presents a Ti3C2Tx MXene/WPU nacre‐mimetic nanomaterial as a printable ink for direct‐write printing onto textiles‐based sensors. The resulting wearable device demonstrates high sensitivity, biocompatibility, and mechanical strength. Furthermore, NFC‐enabled humidity sensor produces time‐series data, which informs a machine learning ...
Lulu Xu+6 more
wiley +1 more source
AI‐generated video steganography based on semantic segmentation
Traditional video steganography methods primarily rely on modifying concealed spaces for embedding, thereby exhibiting a certain degree of security and embedding capacity.
Yangping Lin+4 more
doaj +1 more source
Survey of Technology in Network Security Situation Awareness. [PDF]
Zhang J, Feng H, Liu B, Zhao D.
europepmc +1 more source