Results 211 to 220 of about 5,759,507 (353)
Self‐Trapped Hole Migration and Defect‐Mediated Thermal Quenching of Luminescence in α‐ and β‐Ga2O3
Temperature‐dependent photoluminescence and first‐principles calculations reveal self‐trapped hole migration as the microscopic origin of thermal quenching in α‐ and β‐Ga2O3. The low migration barrier in α‐Ga2O3 enables defect trapping and enhances blue luminescence, while the higher barrier in β‐Ga2O3 preserves ultraviolet emission at elevated ...
Nima Hajizadeh +11 more
wiley +1 more source
Understanding phishing discussions on stack overflow and information security stack exchange. [PDF]
Althobaiti K, Tahaei M.
europepmc +1 more source
Unconditional Security of a Three State Quantum Key Distribution Protocol [PDF]
Jean-Christian Boileau +4 more
openalex +1 more source
Stable ion‐exchange doping of organic semiconductor single crystals is demonstrated using bulky hydrophobic anions. Electrical conductivity is significantly enhanced and maintained under ambient air and elevated temperatures, while intrinsic strain sensitivity remains intact over 100 000 strain cycles. The approach highlights the critical role of anion
Tomohiro Murata +5 more
wiley +1 more source
A Review and Future Directions for Global Public Health Security Assessment Tools. [PDF]
Cheng F, Wang C, Li Y, Wu H.
europepmc +1 more source
Multiple Twinning in Nacre and Aragonite
Electron backscatter diffraction map of a cluster of geologic aragonite, exhibiting single, double, and triple twins. The whole cluster is approximately 2 cm wide. Colors indicate crystal orientations, so that pixels where the a‐, b‐, and c‐axis is perpendicular to the image plane are green, red, and blue, respectively.
Connor A. Schmidt +7 more
wiley +1 more source
This study demonstrates a Maya blue‐inspired hybrid solar evaporator using commercial black acrylic paint, achieving 98% solar‐thermal conversion efficiency and 2.39 kg m−2 h−1 water evaporation rate through a durable, hydrophilic organic–inorganic structure that enables scalable, cost‐effective desalination and wastewater purification.
Dao Thi Dung +5 more
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Towards the Science of Security and Privacy in Machine Learning [PDF]
Nicolas Papernot +3 more
openalex +1 more source

