Results 71 to 80 of about 10,250 (292)
An efficient and privacy protection group authentication scheme in the industrial internet of things
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry.
Tao Wan, Buhai Shi, Jiongen Xiao
doaj +1 more source
THE USE OF ERROR-CORRECTING CODES FOR THE DIAGNOSIS OF RNS MODULAR PROCESSORS
The article considers the principles of diagnosis modular process-ditch constructed on the basis of residual classes. The analysis methods for error detection using the Chinese remainder theorem.
Nikolay Ivanovich Chervyakov +2 more
doaj
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
The approximate greatest common divisor problem (ACD) and its variants have been used to construct many cryptographic primitives. In particular, the variants of the ACD problem based on Chinese remainder theorem (CRT) are being used in the constructions ...
Cheon Jung Hee +4 more
doaj +1 more source
Flexible Memory: Progress, Challenges, and Opportunities
Flexible memory technology is crucial for flexible electronics integration. This review covers its historical evolution, evaluates rigid systems, proposes a flexible memory framework based on multiple mechanisms, stresses material design's role, presents a coupling model for performance optimization, and points out future directions.
Ruizhi Yuan +5 more
wiley +1 more source
In this work, the Doubao large language model (LLM) is involved in the formula derivation processes for Hubbard U determination regarding the second‐order perturbations of the chemical potential. The core ML tool is optimized for physical domain knowledge, which is not limited to parameter prediction but rather serves as an interactive physical theory ...
Mingzi Sun +8 more
wiley +1 more source
IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology.
Mohamed Kasraoui +2 more
doaj +1 more source
This study reveals that sampling strategy (i.e., sampling size and approach) is a foundational prerequisite for building accurate and generalizable AI models in peptide discovery. Reaching a threshold of 7.5% of the total tetrapeptide sequence space was essential to ensure reliable predictions.
Meiru Yan +3 more
wiley +1 more source
Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley +1 more source

