Results 131 to 140 of about 1,199,929 (370)
Covalent Organic Frameworks for Photocatalysis
This review provides an overview of recent advances in covalent organic frameworks (COFs) for photocatalysis, focusing on sustainable energy applications like water splitting, hydrogen peroxide generation, and CO2 and N2 reduction. It discusses design principles, structure‐function relationships, challenges in COF photocatalysis, and strategies to ...
Bikash Mishra+6 more
wiley +1 more source
An Overview of Computer security [PDF]
As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. These systems can be achieved only through systematic design; they cannot be achieved through haphazard seat-of-the-pants methods.This paper introduces ...
arxiv
Threats to Arctic Animals: International Measures Needed for Preservation [PDF]
openalex +1 more source
SummaryMany marine species beyond the glare of fishing quotas are in decline and no more so than in the Mediterranean. Nigel Williams reports.
openaire +2 more sources
This review describes recent developments in the design and synthesis of metal–organic frameworks (MOF)/textile composites for the detoxification of chemical warfare agent and simulants with extensive discussion on the advantages and disadvantages of different methods.
Zhihua Cheng+4 more
wiley +1 more source
M. Englander, Anna-Maria Belli
openaire +4 more sources
State‐of‐the‐Art, Insights, and Perspectives for MOFs‐Nanocomposites and MOF‐Derived (Nano)Materials
Different approaches to MOF‐NP composite formation, such as ship‐in‐a‐bottle, bottle‐around‐the‐ship and in situ one‐step synthesis, are used. Owing to synergistic effects, the advantageous features of the components of the composites are beneficially combined, and their individual drawbacks are mitigated.
Stefanos Mourdikoudis+6 more
wiley +1 more source
Proactive security defense: cyber threat intelligence modeling for connected autonomous vehicles [PDF]
Cybersecurity has become a crucial concern in the field of connected autonomous vehicles. Cyber threat intelligence (CTI), as the collection of cyber threat information, offers an ideal way for responding to emerging cyber threats and realizing proactive security defense.
arxiv
Evidence Tetris in the Pixelated World of Validity Threats [PDF]
Valid empirical studies build confidence in scientific findings. Fortunately, it is now common for software engineering researchers to consider threats to validity when designing their studies and to discuss them as part of their publication. Yet, in complex experiments with human participants, there is often an overwhelming number of intuitively ...
arxiv +1 more source