Results 71 to 80 of about 1,717,630 (292)

Stable and Dendrite‐Free Zinc Metal Anodes Via Interface Nanoarchitectonics for Aqueous Zinc‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
This review explores Zn anode challenges in aqueous ZIBs, including dendrites, corrosion, and side reactions, and discusses strategies for improvement through Zn anode, electrolyte, and separator modifications to enhance stability and efficiency. Abstract Aqueous rechargeable zinc‐ion batteries (ZIBs) are emerging as promising candidates for next ...
Pragati A. Shinde   +5 more
wiley   +1 more source

IPv6-Based Architecture of Community Medical Internet of Things

open access: yesIEEE Access, 2018
The effective integration of Community Medical Internet of Things (CMIoT) and the core technology IPv6 about the next generation of Internet will create a new pattern for the medical field.
Chao Liu   +5 more
doaj   +1 more source

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

open access: yes, 2017
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu   +4 more
core   +1 more source

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

NanoMOF‐Based Multilevel Anti‐Counterfeiting by a Combination of Visible and Invisible Photoluminescence and Conductivity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner   +9 more
wiley   +1 more source

Automatic analysis of alarm embedded with large language model in police robot

open access: yesBiomimetic Intelligence and Robotics
Police robots are used to assist police officers in performing tasks in complex environments, so as to improve the efficiency of law enforcement, ensure the safety of police officers and maintain social stability.
Zirui Liu, Haichun Sun, Deyu Yuan
doaj   +1 more source

On the security of software-defined next-generation cellular networks [PDF]

open access: yes, 2016
In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software ...
Alzahrani, Bander   +3 more
core  

Home - About - Disclaimer - Privacy