Results 101 to 110 of about 169,904 (225)

XOR‐Logic Phase Coding Programmable Metasurface for Low Power‐Consumption Systems

open access: yesAdvanced Science, Volume 13, Issue 22, 17 April 2026.
By leveraging XOR logic, the biasing‐network complexity of 2D programmable metasurfaces is reduced from m×n to m+n through efficient row‐column control. This enables versatile functions including beam deflection and beamforming, facilitating applications in wireless communications and beyond.
Ruichao Zhu   +10 more
wiley   +1 more source

Design of Digital Temperature and Humidity Instrument Based on AT89C51

open access: yesGong-kuang zidonghua, 2012
In view of problem that mechanical and non-digital temperature and humidity instruments cannot upload data, a digital temperature and humidity instrument taking single-chip microcomputer AT89C51 as control core was designed.
ZHENG Meng, LING Liu-yi
doaj  

‘Feeding the world, byte by byte’: emergent imaginaries of data productivism

open access: yesThe Journal of Peasant Studies, 2023
Maywa Montenegro de Wit   +1 more
openaire   +2 more sources

Smart Optogenetics for Real‐Time Automated Control of Cardiac Electrical Activity

open access: yesAdvanced Science, Volume 13, Issue 20, 9 April 2026.
We are able to stop dangerous heart‐rhythm spirals before they fully form. Within about 100 ms, it pinpoints the spiral's tiny central tip (≈0.9 mm) using light‐based sensing and machine learning, then shines targeted light to shut it down. This fast, precise, closed‐loop approach detects, targets, and terminates arrhythmias in real time.
Shanliang Deng   +15 more
wiley   +1 more source

Wavelet Analysis for Localization of Heterogeneities in Byte Distribution in a File to Searching for Encrypted Data

open access: yesБезопасность информационных технологий, 2015
This article is focused on the choice of approach to localize a deviation in byte distribution in a file by means of the wavelet analysis. In the article the dependence of scale parameter and wavelet coefficients values is revealed.
Веста Сергеевна Матвеева   +1 more
doaj  

An Improved YOLOv8 and OC-SORT Framework for Fish Counting

open access: yesJournal of Marine Science and Engineering
Accurate fish population estimation is crucial for fisheries management, ecological monitoring, and aquaculture optimization. Traditional manual counting methods are labor-intensive and error-prone, while existing automated approaches struggle with ...
Yan Li, Zhenpeng Wu, Ying Yu, Chichi Liu
doaj   +1 more source

Flexible Memory: Progress, Challenges, and Opportunities

open access: yesAdvanced Intelligent Discovery, Volume 2, Issue 2, April 2026.
Flexible memory technology is crucial for flexible electronics integration. This review covers its historical evolution, evaluates rigid systems, proposes a flexible memory framework based on multiple mechanisms, stresses material design's role, presents a coupling model for performance optimization, and points out future directions.
Ruizhi Yuan   +5 more
wiley   +1 more source

An In‐Depth Characterization of Page Fault Handling in Modern Persistent Memory Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 7, April 2026.
ABSTRACT Recent advancements in Persistent Memory (PM) technologies have enabled the integration of such devices directly into the processor's memory hierarchy, allowing them to be accessed via standard load/store instructions. These developments have revived interest in the design and implementation of systems capable of effectively supporting PM.
André Libório   +4 more
wiley   +1 more source

Lightweight and Explainable Early Ransomware Detection Using Dynamic API‐Call Features and Ensemble Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan   +4 more
wiley   +1 more source

A lightweight 256 hexadecimal character substitution Cipher algorithm

open access: yesJournal of Electrical Systems and Information Technology
Traditionally, playfair matrix encryption is done by encrypting only 8 bits characters to generate ciphers which are equal to the plaintext. Over the years researchers have proposed to incorporate other characters into the plaintext matrix in order to ...
Ibrahim Lawal   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy