Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Energy-efficient anodic reactions for sustainable hydrogen production via water electrolysis
  • Language: en
  • Pages: 31

Energy-efficient anodic reactions for sustainable hydrogen production via water electrolysis

Overall water splitting is considered as an effective technique for hydrogen (H2) production; however, it usually requires large operating voltage mainly due to the high equilibrium potential of the anodic oxygen evolution reaction (OER). Replacing OER with energy-saving anode reactions not only reduces the operating voltage for H2 production but also generates high-value-added chemicals or purifies wastewater. This review article provides an overview of the fundamental reaction principles of overall water splitting and typical energy-saving alternative anode reactions, including methanol oxidation, hydrazine oxidation, and urea oxidation reactions. Then, the preparation methods, regulation strategies, and composition/structure-performance relations of advanced catalysts for these energy-efficient H2 generation technologies are discussed. Finally, we propose the underlying challenges and perspectives for this promising field.

Cloud Computing Data Auditing Algorithm
  • Language: en
  • Pages: 215

Cloud Computing Data Auditing Algorithm

  • Type: Book
  • -
  • Published: 2017-05-09
  • -
  • Publisher: Notion Press

Many Cloud data auditing algorithms have been proposed to maintain the integrity and privacy of data held in the Cloud. In this book, we present a survey of the state of the art and research of Cloud data auditing techniques with a brief introduction of the basic cloud computing concepts, its architecture and security issues. This book presents an overview of the various methods presently used to perform Cloud data auditing, mostly focusing on integrity and privacy.

Information Security Practice and Experience
  • Language: en
  • Pages: 403

Information Security Practice and Experience

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Advances in Information Security and Assurance
  • Language: en
  • Pages: 865

Advances in Information Security and Assurance

  • Type: Book
  • -
  • Published: 2009-06-18
  • -
  • Publisher: Springer

Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA 2009 was a succ- sor of the First International Workshop on In...

Applied Informatics and Communication, Part III
  • Language: en
  • Pages: 703

Applied Informatics and Communication, Part III

  • Type: Book
  • -
  • Published: 2011-08-02
  • -
  • Publisher: Springer

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Applied Informatics and Communication, Part V
  • Language: en
  • Pages: 700

Applied Informatics and Communication, Part V

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Applied Informatics and Communication, Part I
  • Language: en
  • Pages: 765

Applied Informatics and Communication, Part I

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Applied Informatics and Communication, Part IV
  • Language: en
  • Pages: 739

Applied Informatics and Communication, Part IV

  • Type: Book
  • -
  • Published: 2011-08-02
  • -
  • Publisher: Springer

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011. The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Information and Communication Security
  • Language: en
  • Pages: 444

Information and Communication Security

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.

Digital-Forensics and Watermarking
  • Language: en
  • Pages: 534

Digital-Forensics and Watermarking

  • Type: Book
  • -
  • Published: 2014-07-08
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography and steganalysis; visual cryptography; reversible data hiding; forensics; watermarking; anonymizing and plate recognition.