Results 331 to 340 of about 6,055,547 (381)
The interlocking electrode–electrolyte (IEE) system addresses the challenges of quasi‐solid‐state electrolyte systems, such as void formation and increased interfacial resistance, in silicon microparticle anodes and Ni‐rich layered cathodes. By preserving a stable electrode–electrolyte interface, the IEE system mitigates mechanical degradation and ...
Dong‐Yeob Han+9 more
wiley +1 more source
Engineered Probiotics Mitigate Gut Barrier Dysfunction Induced by Nanoplastics
Intestinal barrier stability is vital for gut health. Plastic polyethylene terephthalate (PET) disrupts this barrier, causing inflammation and infections. This study encodes transforming growth factor‐β into EcN and modifies its surface with pH‐responsive polymer (EcNT@L), creating an oral drug delivery system to repair nano PET‐induced intestinal ...
Wenxin Chen+9 more
wiley +1 more source
Manipulating Charge Dynamics in Carbon Nitride by Carbon Dot Doping for Efficient Photocatalysis
A series of carbon dot (CD) doped graphitic carbon nitride (g‐C3N4) materials have been rationally synthesized, which exhibited different photophysical properties, excitonic behaviors, and photocatalytic degradation activities. It provides valuable insights to deepen the understanding of exciton dynamics based on g‐C3N4 materials, and rational design ...
Lingfeng Ouyang+5 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
International Conference on Automated Software Engineering, 2021It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected ...
T. H. Le+3 more
semanticscholar +1 more source
Beyond vulnerability assessment [PDF]
International ...
Swart, Rob+5 more
openaire +5 more sources
IEEE Transactions on Smart Grid, 2021
This paper studies the vulnerability of deep reinforcement learning (DRL) models for power systems topology optimization under data perturbations and cyber-attack. DRL has recently solved many complex power system optimization problems.
Yan Zheng+5 more
semanticscholar +1 more source
This paper studies the vulnerability of deep reinforcement learning (DRL) models for power systems topology optimization under data perturbations and cyber-attack. DRL has recently solved many complex power system optimization problems.
Yan Zheng+5 more
semanticscholar +1 more source
2021
Vulnerability-based approach includes both climatic and non-climatic factors under the domain of sensitivity, exposure and adaptive capacity. Assessment of vulnerability at spatial level is an utmost necessity in climate change-related impact studies as it helps the government authority to prepare sector-wise plans and to make aware local people about ...
Koyel Sam, Namita Chakma
openaire +2 more sources
Vulnerability-based approach includes both climatic and non-climatic factors under the domain of sensitivity, exposure and adaptive capacity. Assessment of vulnerability at spatial level is an utmost necessity in climate change-related impact studies as it helps the government authority to prepare sector-wise plans and to make aware local people about ...
Koyel Sam, Namita Chakma
openaire +2 more sources
Hospital's vulnerability assessment
2015 International Conference on Industrial Engineering and Systems Management (IESM), 2015As many public institutions, hospitals are open spaces. Patients, staffs, visitors…, can access a lot of care units without control and can be in contact with many people. The most crowded places are often the most vulnerable areas where terrorist attacks can be the most damageable. This paper proposes an approach to evaluate the most crowded places in
Guinet, Alain, Roberto, Faccincani
openaire +3 more sources
Assessing Vulnerability to Suicide
Suicide and Life-Threatening Behavior, 1991ABSTRACT: Three hundred members of the American Association of Suicidology (30% of those who apparently received the questionnaire) participated in a survey in which case histories of two men who had committed suicide and two who had not were presented.
Carol L. Huffine, Janice Furst
openaire +3 more sources
Assessment Of Vulnerability Scanners
Network Security, 2003Securing information over the Internet can be facilitated by a multitude of security technologies. Technologies such as intrusion detection systems, anti-virus software, firewalls and crypto devices have all contributed significantly to the security of information. This article focuses on vulnerability scanners (VSs).
H.S Venter, J. H. P Eloff
openaire +2 more sources