Results 61 to 70 of about 186,948 (311)

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Application-centric congestion control

open access: yesEURASIP Journal on Wireless Communications and Networking
Modern networked applications typically establish multiple connections to one or more servers to ensure that the virtual objects with which the user interacts are kept up to date.
Danny De Vleeschauwer   +3 more
doaj   +1 more source

A feature selection method of network traffic based on statistic and ranking strategy

open access: yesDianzi Jishu Yingyong, 2018
It is required to select the best features from so many ones in order to avoid the high complexity of the model, the low classification accuracy and efficiency caused by redundant and irrelevant features, if network traffic classification is obtained by ...
Liu Jiwei, Zhao Yuexian, Zhao Yang
doaj   +1 more source

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

A Security Architecture for 5G Networks

open access: yesIEEE Access, 2018
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number
Arfaoui, Ghada   +15 more
openaire   +7 more sources

Securing network infrastructure with cyber security

open access: yesWorld Journal of Advanced Research and Reviews, 2023
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure.
openaire   +2 more sources

Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu

open access: yesAdvanced Functional Materials, EarlyView.
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz   +10 more
wiley   +1 more source

Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems

open access: yesSensors
With the significant increase in cyber-attacks and attempts to gain unauthorised access to systems and information, Network Intrusion-Detection Systems (NIDSs) have become essential detection tools.
Joaquín Gaspar Medina-Arco   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy