Single-atom catalysts (SACs) with 100% active sites have excellent prospects for application in the oxygen evolution reaction (OER). However, further enhancement of the catalytic activity for OER is quite challenging, particularly for the development of stable SACs with overpotentials <180 mV. Here, we report an iridium single atom on Ni 2 P catalyst (Ir SA -Ni 2 P) with a record low overpotential of 149 mV at a current density of 10 mA•cm −2 in 1.0 M KOH. The Ir SA -Ni 2 P catalyst delivers a current density up to ∼28-fold higher than that of the widely used IrO 2 at 1.53 V vs RHE. Both the experimental results and computational simulations indicate that Ir single atoms preferentially occupy Ni sites on the top surface. The reconstructed Ir−O−P/Ni−O−P bonding environment plays a vital role for optimal adsorption and desorption of the OER intermediate species, which leads to marked enhancement of the OER activity. Additionally, the dynamic "top-down" evolution of the specific structure of the Ni@Ir particles is responsible for the robust single-atom structure and, thus, the stability property. This Ir SA -Ni 2 P catalyst offers novel prospects for simplifying decoration strategies and further enhancing OER performance.
The electrochemical nitrate reduction reaction (NITRR) is an appealing method for ammonia synthesis, owing to the ambient conditions as well as its abundant sources, low dissociation energy, and high solubility of nitrate. The hydrogen evolution reaction is a competing process of the NITRR, which should be properly suppressed to achieve a high Faradaic efficiency of the NITRR. Herein, ultrathin CoO x nanosheets with abundant surface oxygen are designed as a low-cost NITRR catalyst, which delivers an ultrahigh ammonia yield of 82.4 ± 4.8 mg h −1 mg cat −1 with a Faradaic efficiency of 93.4 ± 3.8% at −0.3 V versus the reversible hydrogen electrode. Theoretical calculation reveals that the surface oxygen on cobalt sites can stabilize the adsorbed hydrogen on cobalt oxide, which hampers the evolution of hydrogen and leads to an enhanced NITRR activity. This work demonstrates that surface modification plays a critical role in suppressing the HER and facilitating the NITRR through a NHO pathway with a lower energy barrier.
The sodium (potassium)‐metal anodes combine low‐cost, high theoretical capacity, and high energy density, demonstrating promising application in sodium (potassium)‐metal batteries. However, the dendrites’ growth on the surface of Na (K) has impeded their practical application. Herein, density functional theory (DFT) results predict Na2Te/K2Te is beneficial for Na+/K+ transport and can effectively suppress the formation of the dendrites because of low Na+/K+ migration energy barrier and ultrahigh Na+/K+ diffusion coefficient of 3.7 × 10−10 cm2 s−1/1.6 × 10−10 cm2 s−1 (300 K), respectively. Then a Na2Te protection layer is prepared by directly painting the nanosized Te powder onto the sodium‐metal surface. The Na@Na2Te anode can last for 700 h in low‐cost carbonate electrolytes (1 mA cm−2, 1 mAh cm−2), and the corresponding Na3V2 (PO4)3//Na@Na2Te full cell exhibits high energy density of 223 Wh kg−1 at an unprecedented power density of 29687 W kg−1 as well as an ultrahigh capacity retention of 93% after 3000 cycles at 20 C. Besides, the K@K2Te‐based potassium‐metal full battery also demonstrates high power density of 20 577 W kg−1 with energy density of 154 Wh kg−1. This work opens up a new and promising avenue to stabilize sodium (potassium)‐metal anodes with simple and low‐cost interfacial layers.
Program code is a precious asset to its owner. Due to the easyto-reverse nature of Java, code protection for Android apps is of particular importance. To this end, code obfuscation is widely utilized by both legitimate app developers and malware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many previous studies focusing on the obfuscation techniques, however, our knowledge on how obfuscation is applied by realworld developers is still limited.In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild. In particular, we focus on four popular obfuscation approaches: identifier renaming, string encryption, Java reflection, and packing. To obtain the meaningful statistical results, we designed efficient and lightweight detection models for each obfuscation technique and applied them to our massive APK datasets (collected from Google Play, multiple thirdparty markets, and malware databases). We have learned several interesting facts from the result. For example, malware authors use string encryption more frequently, and more apps on third-party markets than Google Play are packed. We are also interested in the explanation of each finding. Therefore we carry out in-depth code analysis on some Android apps after sampling. We believe our study will help developers select the most suitable obfuscation approach, and in the meantime help researchers improve code analysis systems in the right direction.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.