Results 71 to 80 of about 10,250 (292)

An efficient and privacy protection group authentication scheme in the industrial internet of things

open access: yesFrontiers in Physics
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry.
Tao Wan, Buhai Shi, Jiongen Xiao
doaj   +1 more source

THE USE OF ERROR-CORRECTING CODES FOR THE DIAGNOSIS OF RNS MODULAR PROCESSORS

open access: yesНаука. Инновации. Технологии, 2022
The article considers the principles of diagnosis modular process-ditch constructed on the basis of residual classes. The analysis methods for error detection using the Chinese remainder theorem.
Nikolay Ivanovich Chervyakov   +2 more
doaj  

Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem

open access: yesJournal of Mathematical Cryptology, 2020
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee   +4 more
doaj   +1 more source

Robustness in Chinese Remainder Theorem

open access: yes, 2017
12 ...
Xiao, Hanshen   +3 more
openaire   +2 more sources

Flexible Memory: Progress, Challenges, and Opportunities

open access: yesAdvanced Intelligent Discovery, EarlyView.
Flexible memory technology is crucial for flexible electronics integration. This review covers its historical evolution, evaluates rigid systems, proposes a flexible memory framework based on multiple mechanisms, stresses material design's role, presents a coupling model for performance optimization, and points out future directions.
Ruizhi Yuan   +5 more
wiley   +1 more source

Machine Learning‐Assisted Second‐Order Perturbation Theory for Chemical Potential Correction Toward Hubbard U Determination

open access: yesAdvanced Intelligent Discovery, EarlyView.
In this work, the Doubao large language model (LLM) is involved in the formula derivation processes for Hubbard U determination regarding the second‐order perturbations of the chemical potential. The core ML tool is optimized for physical domain knowledge, which is not limited to parameter prediction but rather serves as an interactive physical theory ...
Mingzi Sun   +8 more
wiley   +1 more source

Collaborative Key Exchange System Based on Chinese Remainder Theorem in Heterogeneous Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology.
Mohamed Kasraoui   +2 more
doaj   +1 more source

Sampling Strategy: An Overlooked Factor Affecting Artificial Intelligence Prediction Accuracy of Peptides’ Physicochemical Properties

open access: yesAdvanced Intelligent Discovery, EarlyView.
This study reveals that sampling strategy (i.e., sampling size and approach) is a foundational prerequisite for building accurate and generalizable AI models in peptide discovery. Reaching a threshold of 7.5% of the total tetrapeptide sequence space was essential to ensure reliable predictions.
Meiru Yan   +3 more
wiley   +1 more source

Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley   +1 more source

Home - About - Disclaimer - Privacy