Results 181 to 190 of about 1,765,999 (278)
Solution‐processed organic photodetectors (OPDs) based on two novel low band gap non‐fullerene acceptors BZIC‐2F and BZIC‐2Cl, when blended with common polymer donor P3HT, extend detection range beyond 1200 nm with superior performance, rivaling costly inorganic sensors and past literature.
Zhuoran Qiao +18 more
wiley +1 more source
Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection. [PDF]
Alashjaee AM.
europepmc +1 more source
Towards Double Defense Network Security Based on Multi-Identifier Network Architecture. [PDF]
Wang Y, Smahi A, Zhang H, Li H.
europepmc +1 more source
A novel FIRINOX‐loaded implant demonstrates controlled drug release, and potent therapeutic efficacy in pancreatic ductal adenocarcinoma mouse models with safety confirmed in a large‐animal pre‐clinical model. This innovative drug delivery platform offers a promising new treatment approach for non‐resectable, treatment‐resistant pancreatic cancer ...
Samantha J. Wade +19 more
wiley +1 more source
A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security. [PDF]
Li J, Ma Y, Bai J, Chen C, Xu T, Ding C.
europepmc +1 more source
This review highlights recent advances in electrospun nanofiber‐based triboelectric nanogenerators, emphasizing how material design, fiber architecture, and interface engineering collectively enhance output performance and mechanical durability. Key developments in porous, aligned, core‐shell, and hierarchical nanofibers are discussed alongside ...
MD Fajla Rabbi +3 more
wiley +1 more source
3D visualization design of digital intelligent landscape environment based on wireless network security. [PDF]
Liao X.
europepmc +1 more source
Elephant‐skin‐inspired crack networks are programmed in porous diatomaceous earth (DE)‐cement composites using substrate‐guided, stress‐concentration induced fracture. The resulting crack lattices act as capillary conduits that redistribute water, while the porous matrix stores moisture.
Qingya Huang +5 more
wiley +1 more source
A novel research on network security situation prediction based on iteratively optimized RBF-NN. [PDF]
Wu Y +5 more
europepmc +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source

