Results 71 to 80 of about 10,420 (190)

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

We have liftoff: A discovery study to use artificial intelligence to identify adaptative profiles for future space missions

open access: yesPhysiological Reports, Volume 13, Issue 17, September 2025.
Abstract Long‐duration space missions will challenge astronauts' adaptive capacities. Interoception and heart rate variability (HRV), reflecting parasympathetic activity, are increasingly recognized as predictors of adaptation and health. This study investigated whether artificial intelligence may predict adaptation profiles from interoceptive and HRV ...
Barbara Le Roy   +4 more
wiley   +1 more source

An IMU-based traffic and road condition monitoring system

open access: yesHardwareX, 2018
This paper presents a new type of wireless platform designed for real-time traffic estimation and road surface monitoring. The sensor platform is built around a 32-bit ARM Cortex M4 micro-controller and a LSM9DS0 Inertial Measurement Unit module.
Tian Lei   +2 more
doaj   +1 more source

Real‐time Nonlinear Model Predictive Control of a Robotic Arm Using Spatial Operator Algebra Theory

open access: yesJournal of Field Robotics, Volume 42, Issue 5, Page 2337-2354, August 2025.
ABSTRACT Nonlinear model predictive control (NMPC) has inherent challenges, such as high computational burden, nonconvex optimization, and the necessity of powerful and fast processors with large memory for real‐time robotics. In this study, a new NMPC strategy is proposed using Spatial Operator Algebra (SOA) theory to address these challenges, and ...
Tuğçe Yaren, Selçuk Kizir
wiley   +1 more source

Detection of micro‐water in transformer oil based on ultrasonic pulse‐echo method and sparrow search algorithm‐random forest

open access: yesHigh Voltage, Volume 10, Issue 4, Page 917-929, August 2025.
Abstract This study proposes a novel transformer oil micro‐water detection method based on the ultrasonic pulse‐echo technique, optimised by a sparrow search algorithm (SSA) to enhance the prediction performance of a random forest (RF) model. Initially, finite element simulations were conducted to select optimal ultrasonic frequencies of 2 and 2.5 MHz.
Ziwen Huang   +4 more
wiley   +1 more source

State‐dependent neural representations of muscle synergies in the spinal cord revealed by optogenetic stimulation

open access: yesThe Journal of Physiology, Volume 603, Issue 16, Page 4659-4679, 15 August 2025.
Abstract figure legend Spike trains and muscle activities elicited by optogenetic stimulation revealed state‐dependent encoding of muscle synergies by upstream spinal interneurons. Abstract The central nervous system controls movement by combining neuromotor modules, known as muscle synergies. Previous studies suggest that spinal premotor interneurons (
Borong He   +4 more
wiley   +1 more source

MODEL-ORIENTED METHOD OF DESIGN IMPLEMENTATION WHEN CREATING DIGITAL FILTERS

open access: yesАвтоматизация технологических и бизнес-процессов, 2016
This article discusses the example of model-oriented method of design and development of digital low-pass filters (LPF) for automatic control systems (ACS).
V. Levinskyi, M. Levinskyi
doaj   +1 more source

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation

open access: yesCryptography
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj   +1 more source

Getting It Together: Psychological Unity and Deflationary Accounts of Animal Metacognition [PDF]

open access: yes, 2018
Experimenters claim some nonhuman mammals have metacognition. If correct, the results indicate some animal minds are more complex than ordinarily presumed.
Bauer, William A., Comstock, Gary
core  

Home - About - Disclaimer - Privacy