Results 331 to 340 of about 6,055,547 (381)

Covalently Interlocked Electrode–Electrolyte Interface for High‐Energy‐Density Quasi‐Solid‐State Lithium‐Ion Batteries

open access: yesAdvanced Science, EarlyView.
The interlocking electrode–electrolyte (IEE) system addresses the challenges of quasi‐solid‐state electrolyte systems, such as void formation and increased interfacial resistance, in silicon microparticle anodes and Ni‐rich layered cathodes. By preserving a stable electrode–electrolyte interface, the IEE system mitigates mechanical degradation and ...
Dong‐Yeob Han   +9 more
wiley   +1 more source

Engineered Probiotics Mitigate Gut Barrier Dysfunction Induced by Nanoplastics

open access: yesAdvanced Science, EarlyView.
Intestinal barrier stability is vital for gut health. Plastic polyethylene terephthalate (PET) disrupts this barrier, causing inflammation and infections. This study encodes transforming growth factor‐β into EcN and modifies its surface with pH‐responsive polymer (EcNT@L), creating an oral drug delivery system to repair nano PET‐induced intestinal ...
Wenxin Chen   +9 more
wiley   +1 more source

Manipulating Charge Dynamics in Carbon Nitride by Carbon Dot Doping for Efficient Photocatalysis

open access: yesAdvanced Science, EarlyView.
A series of carbon dot (CD) doped graphitic carbon nitride (g‐C3N4) materials have been rationally synthesized, which exhibited different photophysical properties, excitonic behaviors, and photocatalytic degradation activities. It provides valuable insights to deepen the understanding of exciton dynamics based on g‐C3N4 materials, and rational design ...
Lingfeng Ouyang   +5 more
wiley   +1 more source
Some of the next articles are maybe not open access.

Related searches:

DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

International Conference on Automated Software Engineering, 2021
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected ...
T. H. Le   +3 more
semanticscholar   +1 more source

Beyond vulnerability assessment [PDF]

open access: possibleNature Climate Change, 2013
International ...
Swart, Rob   +5 more
openaire   +5 more sources

Vulnerability Assessment of Deep Reinforcement Learning Models for Power System Topology Optimization

IEEE Transactions on Smart Grid, 2021
This paper studies the vulnerability of deep reinforcement learning (DRL) models for power systems topology optimization under data perturbations and cyber-attack. DRL has recently solved many complex power system optimization problems.
Yan Zheng   +5 more
semanticscholar   +1 more source

Assessment of Vulnerability

2021
Vulnerability-based approach includes both climatic and non-climatic factors under the domain of sensitivity, exposure and adaptive capacity. Assessment of vulnerability at spatial level is an utmost necessity in climate change-related impact studies as it helps the government authority to prepare sector-wise plans and to make aware local people about ...
Koyel Sam, Namita Chakma
openaire   +2 more sources

Hospital's vulnerability assessment

2015 International Conference on Industrial Engineering and Systems Management (IESM), 2015
As many public institutions, hospitals are open spaces. Patients, staffs, visitors…, can access a lot of care units without control and can be in contact with many people. The most crowded places are often the most vulnerable areas where terrorist attacks can be the most damageable. This paper proposes an approach to evaluate the most crowded places in
Guinet, Alain, Roberto, Faccincani
openaire   +3 more sources

Assessing Vulnerability to Suicide

Suicide and Life-Threatening Behavior, 1991
ABSTRACT: Three hundred members of the American Association of Suicidology (30% of those who apparently received the questionnaire) participated in a survey in which case histories of two men who had committed suicide and two who had not were presented.
Carol L. Huffine, Janice Furst
openaire   +3 more sources

Assessment Of Vulnerability Scanners

Network Security, 2003
Securing information over the Internet can be facilitated by a multitude of security technologies. Technologies such as intrusion detection systems, anti-virus software, firewalls and crypto devices have all contributed significantly to the security of information. This article focuses on vulnerability scanners (VSs).
H.S Venter, J. H. P Eloff
openaire   +2 more sources

Home - About - Disclaimer - Privacy