The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Metal halide perovskite colloidal quantum wells (CQWs) hold great promise for modern photonics and optoelectronics. However, current studies focus on Ruddlesden–Popper (R–P) phase perovskite CQWs that contain bilayers of monovalent long‐chain alkylamomoniums between the separated perovskite octahedra layers. The bilayers are packed back‐to‐back via weak van der Waals interaction, resulting in inferior...
InP quantum dots (QDs) have attracted much attention owing to their nontoxic properties and shown great potential in optoelectronic applications. Due to the surface defects and lattice mismatch, the interfacial structure of InP/ZnS QDs plays a significant role in their performance. Herein, the formation of In–S and Sx–In–P1−x interlayers through anion exchange at the shell‐growth stage is revealed...
The large-scale network environment incarnates interconnection of different security domains. There are different security policies in the domain or among the domains, and conflicts can arise in the set of policies which lack of trust and consultation. A network security policy model is proposed in this paper. By defining and describing security policy and domain, the policies’ integrity, validity,...
Summary form only given. Based on analysis of inherent limitations in existing security response decision-making systems, a dynamic adaptive fault response model is presented. Several security fault levels were found, which comprise the basic level, equipment level and mechanism level. Fault damage cost is calculated using the analytic hierarchy process. The combination of security policy in the circumstance,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.