Results 201 to 210 of about 199,054 (253)

Electron‐Induced Molecular Programming Drives Interfacial Chemistry for Ah‐Level Zinc Batteries

open access: yesAdvanced Materials, EarlyView.
We establish an electron‐driven molecular programming strategy that converts spontaneous solid electrolyte interphase formation into a bonding‐defined interfacial architecture. Coordinative integration of p‐bromoaniline with ZnF2 forms a dipole‐regulated molecular lock that reconfigures interfacial electrostatics, suppresses parasitic water reactions ...
Feifei Wang   +12 more
wiley   +1 more source

Powder‐to‐Film Conversion of Nickel Single‐Atom Catalysts into Binder‐Free and Resistant Electrodes

open access: yesAdvanced Materials Interfaces, EarlyView.
A reproducible strategy is reported for fabricating standalone thin‐film electrodes composed of CNx‐supported Ni single‐atom catalysts. The resulting binder‐free electrodes exhibit robust stability, enhanced charge transfer, and superior electrochemical performance, offering scalable opportunities for applications in electrochemistry. ABSTRACT Although
Milla Vigliengo   +8 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Vulnerability Assessment

This chapter is a series of points the event team can consider to uncover any areas of their event and management vulnerable to the risk of corruption. It is based on the work of the UN, EU and others and adapted to an event project team. The output from the table should assist the creation of an Anti-Corruption Policy for the event. This is about risk
Lawrence J. Fennelly, Marianna A. Perry
  +5 more sources

Assessing Vulnerability to Suicide

Suicide and Life-Threatening Behavior, 1991
ABSTRACT: Three hundred members of the American Association of Suicidology (30% of those who apparently received the questionnaire) participated in a survey in which case histories of two men who had committed suicide and two who had not were presented.
J, Furst, C L, Huffine
openaire   +2 more sources

Vulnerability assessment

Biometric Technology Today, 2011
Ted Dunstone, Geoff Poulton
openaire   +2 more sources

Assessing Social Vulnerability

2014
A critical piece, and often the most neglected piece, of resilience to disaster is the identification and mapping of a community’s social vulnerabilities. When disaster strikes, its impact is not just a function of its magnitude and where it strikes.
Jaimie Hicks Masterson   +5 more
openaire   +1 more source

Vulnerabilities assessment — Part 1. Vulnerability basics

Network Security, 1999
Part 1 of this two-part series will define vulnerabilities, explain how to determine their importance, list the general types of vulnerabilities and explain how to properly treat them. Concentrating on Internet-related vulnerabilities, Part 2 will detail how to find the vulnerabilities that are typically most important, explain how to treat them and ...
openaire   +1 more source

Home - About - Disclaimer - Privacy