Results 81 to 90 of about 377,649 (289)
Compressive Sampling with Multiple Bit Spread Spectrum-Based Data Hiding
We propose a novel data hiding method in an audio host with a compressive sampling technique. An over-complete dictionary represents a group of watermarks.
Gelar Budiman +2 more
doaj +1 more source
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
New Advances in Audio Signal Processing
The growth in computing capabilities has significantly transformed the realm of data analysis and processing, most notably through the widespread adoption of artificial intelligence (AI) and deep learning technologies [...]
Giovanni Costantini +2 more
doaj +1 more source
A high‐quality solution‐processed Sb2(S,Se)3/CdS heterojunction is designed to overcome the intrinsic limitations of conventional photodetectors. The fabricated device achieves an excellent self‐powered performance, including a high responsivity of 0.6 A W−1, an ultrahigh specific detectivity of 7.68 × 1012 Jones, and a wide 3db bandwidth of 175 kHz ...
Xuhua Xiao +6 more
wiley +1 more source
Sub‐Unit‐Cell Logic Governs Transport in TPMS Architectures
ABSTRACT Next‐generation energy, thermal, and chemical systems require architectures capable of highly efficient transport across multiple length scales. Triply periodic minimal surfaces (TPMS), first conceptualized in 1865, offer inherently scalable geometries with exceptional transport potential, yet mechanistic links between topology and performance
Haozhang Zhong +16 more
wiley +1 more source
Robust and secure systems for audio signals
Audio steganography is considered a crucial technique for bolstering information security. It is used to hide sensitive data within an audio signal. This paper presents two robust techniques for audio steganography, which embed secret images within the ...
Marwa A. Nasr +5 more
doaj +1 more source
Emergency locating transmitter [PDF]
A transmitter generates three signals for sequential transmission. These signal are an unmodulated r.f. carrier, a r.f. carrier amplitude modulated by a first audio frequency waveform and a r.f.
Wren, Paul E.
core +1 more source
This work demonstrates a receiver‐transmitter‐integrated metasurface that decomposes an incident wave into orthogonal components and routes them into separate channels. Inspired by a “Wheel‐of‐Fortune” mechanism, it enables independent control over the amplitude, phase, and polarization of the transmitted wave.
Tong Liu +8 more
wiley +1 more source
WS2‐based in‐memory sensing reservoir computing integrates sensing, memory, and computation in one compact device. It achieves ∼94% N‐MNIST, ∼93% eye motion perception, and ∼89% speech recognition with ultra‐low energy (∼25.5 fJ/spike). The system shows stability at 95% humidity, endurance over 1.5M cycles, and supports synaptic plasticity, enabling ...
Dayanand Kumar +9 more
wiley +1 more source
On the Mathematics of Music: From Chords to Fourier Analysis [PDF]
Mathematics is a far reaching discipline and its tools appear in many applications. In this paper we discuss its role in music and signal processing by revisiting the use of mathematics in algorithms that can extract chord information from recorded music.
Lenssen, Nathan, Needell, Deanna
core

