1,114 research outputs found

    Chemical Functionalization of Graphene Nanoplatelets with Hydroxyl, Amino, and Carboxylic Terminal Groups

    Get PDF
    As the most studied two-dimensional material, graphene is still attracting a lot of attention from both academia and industry due to its fantastic properties such as lightness, excellent mechanical strength, and high conductivity of heat and electricity. As an important branch of graphene materials, graphene nanoplatelets show numerous applications such as in coating, fillers of polymer composites, energy conversion and storage devices, sensing, etc. Chemical functionalization can introduce different functional groups to graphene nanoplatelets and can potentially endow them with different properties and functions to meet the increasing demand in the fields mentioned above. In this minireview, we present an overview of the research progress of functionalized graphene nanoplatelets bearing hydroxyl, amino, and carboxylic terminal groups, including both covalent and noncovalent approaches. These terminal groups allow subsequent functionalization reactions to attach additional moieties. Relevant characterization techniques, different applications, challenges, and future directions of functionalized graphene nanoplatelets are also critically summarized

    A Novel Aqueous Asymmetric Supercapacitor based on Pyrene-4,5,9,10-Tetraone Functionalized Graphene as the Cathode and Annealed Ti3C2Tx MXene as the Anode

    Get PDF
    Asymmetric supercapacitors (ASCs), employing two dissimilar electrode materials with a large redox peak position difference as cathode and anode, have been designed to further broaden the voltage window and improve the energy density of supercapacitors. Organic molecule based electrodes can be constructed by combining redox-active organic molecules with conductive carbon-based materials such as graphene. Herein, pyrene-4,5,9,10-tetraone (PYT), a redox-active molecule with four carbonyl groups, exhibits a four-electron transfer process and can potentially deliver a high capacity. PYT is noncovalently combined with two different kinds of graphene (Graphenea [GN] and LayerOne [LO]) at different mass ratios. The PYT-functionalized GN electrode (PYT/GN 4–5) possesses a high capacity of 711 F g−1\ua0at 1 A g−1\ua0in 1\ua0M H2SO4. To match with the PYT/GN 4–5 cathode, an annealed-Ti3C2Tx\ua0(A-Ti3C2Tx) MXene anode with a pseudocapacitive character is prepared by pyrolysis of pure Ti3C2Tx. The assembled PYT/GN 4–5//A-Ti3C2Tx\ua0ASC delivers an outstanding energy density of 18.4\ua0Wh kg−1\ua0at a power density of 700\ua0W kg−1. The PYT-functionalized graphene holds great potential for high-performance energy storage devices

    Predicting Bankruptcy After The Sarbanes-Oxley Act Using Logit Analysis

    Get PDF
    Our study proposes firm bankruptcy prediction using logit analysis after the passage of the Sarbanes-Oxley (SOX) Act using 2008-2009 U.S. data. The results of our logit analysis show an 80% (90% with one year before bankruptcy data) prediction accuracy rate using financial and other data from the 10-K report in the post-SOX period. This prediction rate is comparable to other data mining tools. Overall, our results show that, as compared to the prediction rates documented by other bankruptcy studies before SOX, firm bankruptcy prediction rates have improved since the passage of SOX. Our findings shed light on the benefits of SOX by providing evidence that legislation makes the financial reporting more informative. This study is important for regulators to implement public policy. Investors may be interested in our findings to better assess company risk when making portfolio decisions

    Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks

    Get PDF
    This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each subset also plays an important role in sensor network performance because when active sensors periodically send data to base stations, contention for channel access must be considered. The number of available channels imposes a limit on the cardinality of each subset. Coverage breach happens when a subset of sensors cannot completely cover all the targets. To make efficient use of both energy and bandwidth with a minimum coverage breach is the goal of sensor network design. This paper presents the minimum breach problem using a mathematical model, studies the computational complexity of the problem, and provides two approximate heuristics. Effects of increasing the number of channels and increasing the number of sensors on sensor network coverage are studied through numerical simulations. Overall, the simulation results reveal that when the number of sensors increases, network lifetimes can be improved without loss of network coverage if there is no bandwidth constraint; with bandwidth constraints, network lifetimes may be improved further at the cost of coverage breach

    Improving Channel Throughput of WLANs and Ad Hoc Networks Using Explicit Denial of Requests

    Get PDF
    A new Multiple Access Control scheme for wireless ad hoc networks and WLANs is proposed. This scheme uses explicit denial of channel requests and a busy tone to improve channel throughput. Performance analysis shows significant improvement when the network is under heavy traffic load

    Proving Secure Properties of Cryptographic Protocols with Knowledge Based Approach

    Get PDF
    Cryptographic protocols have been widely used to protect communications over insecure network environments. Existing cryptographic protocols usually contain flaws. To analyze these protocols and find potential flaws in them, the secure properties of them need be studied in depth. This paper attempts to provide a new framework to analyze and prove the secure properties in these protocols. A number of predicates and action functions are used to model the network communication environment. Domain rules are given to describe the transitions of principals\u27 knowledge and belief states. An example of public key authentication protocols has been studied and analysed

    ENGINEERING-ORIENTED BENCHMARKING AND APPLICATION-BASED MAGNETIC MATERIAL MODELING IN TRANSFORMER RESEARCH

    Get PDF
    The paper highlights the engineering-oriented benchmarking and application-based magnetic material modeling, as two important events in transformer research, reviews the newly extended progress in TEAM (Testing Electromagnetic Analysis Methods) Problem 21 Family, and presents the related benchmarking results

    The Determinants of Bankruptcy for Chinese Firms

    Get PDF
    The global financial crisis in 2008 increased the number of business failures in the U.S. as well as in China. The Chinese economy has also been affected by the recent global financial crisis given the fact that the Chinese economy depends heavily on international trade. Our study tries to find the determinants of bankruptcy in Chinese firms. Both logit and survival model analyses provide consistent results on the determinants in predicting distressed firms in China. Our results suggest that firms with liquidity problems and firms experiencing a decline in profits are more likely to file for bankruptcy. In addition, we find that, compared to state-owned enterprises (SOEs), collectively-owned enterprises, private-owned enterprises, and foreign-owned businesses are more likely to file for bankruptcy. This conclusion is robust after controlling for regional differences. The findings of this study show that the financial variables developed by Altman [Financial ratios, discriminant analysis and the prediction of corporate bankruptcy. Journal of Finance, 23(3), 589–609] and Ohlson [Financial ratios and probabilistic prediction of bankruptcy. Journal of Accounting Research, 18(1), 109–131] perform reasonably well in determining business failures of Chinese firms even though SOEs and shadow financing exist in China

    A Mathematical Formulation of DNA Computation

    Get PDF
    DNA computation is to use DNA molecules for information storing and processing. The task is accomplished by encoding and interpreting DNA molecules in suspended solutions before and after the complementary binding reactions. DNA computation is attractive, due to its fast parallel information processing, remarkable energy efficiency, and high storing capacity. Challenges currently faced by DNA computation are (1) lack of theoretical computational models for applications, and (2) high error rate for implementation. This paper attempts to address these problems from mathematical modeling and genetic coding aspects. The first part of this paper presents a mathematical formulation of DNA computation. The model may serve as a theoretical framework for DNA computation. In the second part, a genetic code based DNA computation approach is presented to reduce error rate for implementation, which has been a major concern for DNA computation. The method provides a promising alternative to reduce error rate for DNA computation
    • …
    corecore