Results 61 to 70 of about 349,669 (308)

Feature Disentangling and Combination Implemented by Spin–Orbit Torque Magnetic Tunnel Junctions

open access: yesAdvanced Intelligent Systems, EarlyView.
Spin–orbit torque magnetic tunnel junctions (SOT‐MTJs) enable efficient feature disentangling and integration in image data. A proposed algorithm leverages SOT‐MTJs as true random number generators to disentangle and recombine features in real time, with experimental validation on emoji and facial datasets.
Xiaohan Li   +15 more
wiley   +1 more source

An Agent-Based System for Location Privacy Protection in Location-Based Services

open access: yesISPRS International Journal of Geo-Information
Location-based services (LBSs) are a crucial element of the Internet of Things (IoT) and have garnered significant attention from both researchers and users, driven by the rise of wireless devices and a growing user base.
Omar F. Aloufi   +2 more
doaj   +1 more source

Information-Centric Networking Cache Robustness Strategy for System Wide Information Management

open access: yesIEEE Access, 2020
This study focused on the data center overload and resource allocation imbalance problem during the task processing of System Wide Information Management (SWIM).
Gang Li, Zhijun Wu
doaj   +1 more source

ControlIt: A Universal Framework for Translational, Adaptive, and Online Brain–Computer Interfaces

open access: yesAdvanced Intelligent Systems, EarlyView.
Brain–computer interfaces (BCIs) lack a unified platform that works across signals and algorithms. ControlIt, an open‐source, modular ROS2‐based BCI framework supporting electroencephalography (EEG), electrocorticography (ECoG), and spike‐based decoding across both classification and regression tasks is presented.
Wanlin Yang   +12 more
wiley   +1 more source

Task Caching, Offloading, and Resource Allocation in D2D-Aided Fog Computing Networks

open access: yesIEEE Access, 2019
In this paper, we investigate the allocation of resource in D2D-aided Fog computing system with multiple mobile user equipments (MUEs). We consider each MUE has a request for task from a task library and needs to make a decision on task performing with a
Yanwen Lan   +4 more
doaj   +1 more source

Multicopy Cache

open access: yesACM Transactions on Embedded Computing Systems, 2014
Caches are known to consume a large part of total microprocessor energy. Traditionally, voltage scaling has been used to reduce both dynamic and leakage power in caches. However, aggressive voltage reduction causes process-variation-induced failures in cache SRAM arrays, thus compromising cache reliability. We present MultiCopy Cache (MC
Chakraborty, Arup   +5 more
openaire   +3 more sources

Wind‐driven seed dispersal differentially promotes seed trapping and retention across alpine plants

open access: yesAmerican Journal of Botany, EarlyView.
Abstract Premise Seed dispersal can mediate species interactions between plants across life stages. Plants can physically stop seed movement (seed trapping) and prevent further dispersal following entrapment (seed retention). We therefore hypothesized seed trapping and retention rates depend on the physical attributes of interacting seeds and plants ...
Courtenay A. Ray   +7 more
wiley   +1 more source

Individualized Treatment in Distal and Medium Vessel Occlusion Stroke Using a Validated Explainable Counterfactual Treatment Estimation Model

open access: yesAnnals of Neurology, EarlyView.
Objective The optimal treatment for distal medium vessel occlusion (DMVO) stroke remains uncertain, and evidence comparing endovascular therapy (EVT) with medical management (MM) is limited. We aimed to develop and validate a predictive modeling tool to assess individual treatment benefit in DMVO stroke using explainable counterfactual treatment ...
Mohamed F. Doheim   +14 more
wiley   +1 more source

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

open access: yesIEEE Access, 2019
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy