Results 51 to 60 of about 224,759 (272)

Synergistic Pyro‐Phototronics and Structural Anisotropy in CsAg2I3/GaN Heterostructures for High‐Performance Polarization‐Sensitive UV Photodetectors

open access: yesAdvanced Science, EarlyView.
The development of polarization‐sensitive ultraviolet photodetectors is limited by poor heterojunction quality and low polarization sensitivity. This study integrates synthesized CsAg2I3 single crystals with intrinsic non‐centrosymmetry into van der Waals heterojunction devices, demonstrating pronounced pyro‐phototronic effect.
Yalin Zhai   +9 more
wiley   +1 more source

An Evaluation of Mortality Rates and Their Determinants in a Cohort of Former Asbestos Miners in South Africa

open access: yesAmerican Journal of Industrial Medicine, EarlyView.
ABSTRACT Background A causal association between occupational asbestos exposure and lung disease, including pneumoconiosis and mesothelioma, is well established. Elevated mortality among former asbestos miners is expected. However, large‐scale South African studies examining all‐cause mortality in this population are lacking.
Yumna Williams‐Mohamed   +3 more
wiley   +1 more source

Technobiological Pathways for High‐CO₂ Capture Using Micro‐/Macroalgae: Genetic Engineering, Process Automation, and Value‐Added Bioproducts

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Greenhouse gas (GHG) emissions have emerged as one of the most critical drivers of climate change; this is primarily due to high concentrations and long atmospheric life of carbon dioxide (CO2). For a significant amount of time, various biological processes such as microalgal cultivation, cyanobacterial systems, photosynthetic microorganisms ...
Sadhana Semwal, Harish Chandra Joshi
wiley   +1 more source

Meaningful Secret Image Sharing with Uniform Image Quality

open access: yesMathematics, 2022
In meaningful secret image sharing (MSIS), a secret image is divided into n shadows. Each shadow is meaningful and similar to the corresponding cover image.
Jingwen Cheng   +3 more
doaj   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Steganographic secret sharing via AI-generated photorealistic images

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Steganographic secret sharing is an access control technique that transforms a secret message into multiple shares in a steganographic sense. Each share is in a human-readable format in order to dispel suspicion from a malicious party during transmission
Kai Gao   +3 more
doaj   +1 more source

A reversible and lossless secret image sharing scheme with authentication for color images

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific ...
Wendan Li   +4 more
doaj   +1 more source

Redescription of the Triassic cynodont Cistecynodon parvus and reassessment of its phylogeny

open access: yesThe Anatomical Record, EarlyView.
Abstract Cynodontia is an important subclade of Therapsida that first occurred in the late Permian. It includes extinct subclades which are the non‐mammaliaform cynodonts and Mammaliaformes, with the latter ultimately giving rise to crown mammals. The systematics of non‐mammaliaform cynodonts has been extensively studied and is relatively well‐resolved,
Erin S. Lund   +4 more
wiley   +1 more source

Weighted Secret Image Sharing for a $(k,n)$ Threshold Based on the Chinese Remainder Theorem

open access: yesIEEE Access, 2019
In general, in a secret image sharing (SIS) scheme with a (k, n) threshold, the participants have equal weights, and their shares have the same average light transmission. No share can reveal any information about the secret.
Longdan Tan   +4 more
doaj   +1 more source

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Home - About - Disclaimer - Privacy