Results 61 to 70 of about 208,466 (300)
Information Bottleneck Classification in Extremely Distributed Systems
We present a new decentralized classification system based on a distributed architecture. This system consists of distributed nodes, each possessing their own datasets and computing modules, along with a centralized server, which provides probes to ...
Denis Ullmann +5 more
doaj +1 more source
A Homologous Series of Cobalt, Rhodium, and Iridium Metalloradicals [PDF]
We herein present a series of d7 trimethylphosphine complexes of group 9 metals that are chelated by the tripodal tetradentate tris(phosphino)silyl ligand [SiP^(iPr)_3]H ([SiP^(iPr)_3] = (2_(-i)Pr_2PC_6H_4)_3Si^–).
Peters, Jonas C., Takaoka, Ayumi
core +1 more source
High Load Control Mechanism for SIP Servers [PDF]
To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this ...
Budiarto, Rahmat +3 more
core +4 more sources
Self‐Immolative Gels: Programmable Degradation Using Self‐Immolative Linkers and Polymers
Self‐immolative linkers and polymers undergo bond‐cleaving reaction cascades in response to specific stimuli. Their incorporation into gels can be harnessed to release cargo, induce property changes, or trigger degradation in a highly controlled manner. These functions can be employed in applications such as sensing and drug delivery.
Chuanfeng Li, Elizabeth R. Gillies
wiley +1 more source
This paper explains how fraud on modern VoIP-Systems works and which attacks are executed. This was examined practically by the example of a honey pot PBX, which ran for about 3 months and was monitored accordingly.
Benedikt Machens +2 more
doaj +1 more source
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig +46 more
core +1 more source
Abstract The synthesis and characterization of an amphiphilic nitroxide to be used as a controlling agent in a nitroxide‐mediated living radical polymerization in aqueous dispersion media is presented. In the first stage of nitroxide synthesis (phthalimide protection), two reaction methods were employed: traditional and microwave.
Enrique García‐Leal +3 more
wiley +1 more source
Graphical abstract illustrating the niobic acid precipitation process applied and the product obtained. Abstract This study investigates the precipitation of niobic acid (Nb2O5.nH2O) from potassium niobate solution with addition of sulphuric acid, and its subsequent thermal conversion into niobium oxide (Nb2O5). Thermodynamic modelling with PHREEQC and
Cássia R. Souza +4 more
wiley +1 more source
Innovative electrospun geopolymer/zeolite/PVA composite membranes
Proposed scheme of gas adsorption mechanisms on electrospun geopolymer/zeolite/PVA composite membranes. Abstract Innovative electrospun poly(vinyl alcohol) (PVA)–geopolymer–zeolite 13X composite membranes were successfully fabricated and systematically characterized.
Mariana Schneider +7 more
wiley +1 more source
We have developed a multifunctional buried‐interface engineering strategy using phenethylammonium thiocyanate to regulate quasi‐2D perovskite crystallization and stabilize the lattice. The synergistic effects of SCN− and PEA+ steric confinement promote phase redistribution toward n = 2, suppressing interfacial defects and enabling the production of ...
He Dong +11 more
wiley +1 more source

