228,295 research outputs found

    CoNiFe-layered double hydroxide decorated Co-N-C network as a robust bi-functional oxygen electrocatalyst for zinc-air batteries

    Get PDF
    Rechargeable zinc-air batteries (ZABs) are cost-effective energy storage devices and display high-energy density. To realize high round-trip energy efficiency, it is critical to develop durable bi-functional air electrodes, presenting high catalytic activity towards oxygen evolution/reduction reactions together. Herein, we report a nanocomposite based on ternary CoNiFe-layered double hydroxides (LDH) and cobalt coordinated and N-doped porous carbon (Co-N-C) network, obtained by the in-situ growth of LDH over the surface of ZIF-67-derived 3D porous network. Co-N-C network contributes to the oxygen reduction reaction activity, while CoNiFe-LDH imparts to the oxygen evolution reaction activity. The rich active sites and enhanced electronic and mass transport properties stemmed from their unique architecture, culminated into outstanding bi-functional catalytic activity towards oxygen evolution/reduction in alkaline media. In ZABs, it displays a high peak power density of 228 mW cm−2 and a low voltage gap of 0.77 V over an ultra-long lifespan of 950 h. (Figure presented.)

    Performance analysis of a security architecture for active networks in Java

    Get PDF
    Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network operation. Active networks are composed of special nodes (named Active Router) that are able to execute active code to offer the active services. This technology introduces some security threats that must be solved using a security architecture. We have developed a security architecture (ROSA) for an active network platform (SARA). Java has been used as programming language in order to provide portability, but it imposes some performance limitations. This paper analyses the penalty of using Java and proposes some mechanisms to improve the performance of cryptographic implementations in Java.Publicad

    Multidomain Network Based on Programmable Networks: Security Architecture

    Get PDF
    This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes located in the architecture of the network. The programmable nodes execute codes to process active packets, which can carry user data and control information. The multiservice network model defined here considers the more pragmatic trends in programmable networks. In this scenario, new security risks that do not appear in traditional IP networks become visible. These new risks are as a result of the execution of code in the programmable nodes and the processing of the active packets. The proposed security architecture is based on symmetric cryptography in the critical process, combined with an efficient manner of distributing the symmetric keys. Another important contribution has been to scale the security architecture to a multidomain scenario in a single and efficient way.Publicad

    Passive Loop Interference Suppression in Large-Scale Full-Duplex Cellular Networks

    Full text link
    Loop interference (LI) in wireless communications, is a notion resulting from the full-duplex (FD) operation. In a large-scale network, FD also increases the multiuser interference due to the large number of active wireless links that exist. Hence, in order to realize the FD potentials, this interference needs to be restricted. This paper presents a stochastic geometry model of FD cellular networks where the users and base stations employ directional antennas. Based on previous experimental results, we model the passive suppression of the LI at each FD terminal as a function of the angle between the two antennas and show the significant gains that can be achieved by this method. Together with the reduction of multiuser interference resulting from antenna directionality, our model demonstrates that FD can potentially be implemented in large-scale directional networks.Comment: to appear in Proc. IEEE SPAWC 201
    corecore