Results 51 to 60 of about 70,576 (258)
A probabilistic framework based on random time‐space coding metasurfaces enables control of the spatial distribution of electromagnetic fields temporal statistics. By tailoring the marginal and joint distributions of random codes, electromagnetic fields with desired mean and variance patterns are realized, enabling simultaneous transmission and jamming.
Jia Cheng Li +3 more
wiley +1 more source
This tutorial introduces a practical framework for implementing early‐stage Life‐Cycle Assessment (LCA) in flexible and printed electronics. Using organic electrochemical transistors (OECTs) as a case study, the modular Process‐of‐Record and open‐access inventory provides a rich resource adaptable to a plethora of technologies in printed electronics ...
Laura Teuerle +6 more
wiley +1 more source
The rapid advancement of B5G/6G and wireless technologies, combined with rising end-user numbers, has intensified radio spectrum congestion. Automatic modulation recognition, crucial for spectrum sensing in cognitive radio, traditionally relies on ...
Yu Li +5 more
doaj +1 more source
Three-Dimensional Geometry Reconstruction Method from Multi-View ISAR Images Utilizing Deep Learning
The three-dimensional (3D) geometry reconstruction method utilizing ISAR image sequence energy accumulation (ISEA) shows great performance on triaxial stabilized space targets but fails when there is unknown motion from the target itself.
Zuobang Zhou +3 more
doaj +1 more source
Terahertz Channel Modeling, Estimation and Localization in RIS‐Assisted Systems
Reconfigurable intelligent surfaces have become a recent intensive research focus. Based on practical applications, channel strategies for RIS‐assisted terahertz wireless communication systems are categorized into three different types: channel modeling, channel estimation, and channel localization.
Hongjing Wang +9 more
wiley +1 more source
An n-sided polygonal model to calculate the impact of cyber security events
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens +6 more
core +1 more source
A concealable physical unclonable function (PUF) based on an array of 384 nanoscale voltage‐controlled magnetic tunnel junctions is demonstrated. The PUF operates without any external magnetic field. It uses a combination of deterministic and stochastic switching mechanisms, based on the spin transfer torque and voltage‐controlled magnetic anisotropy ...
Thomas Neuner +6 more
wiley +1 more source
Waveform Design for Cognitive Radar Under Low PAR Constraints by Convex Optimization
To improve the detection performance of the radar transmit waveform while enabling the transmitter to perform at its maximal efficiency, a joint design method is proposed for the transmit and receive filter in the presence of signal-dependent clutter ...
Hao Tianduo +3 more
doaj +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
On Ladder Logic Bombs in Industrial Control Systems
In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e.
D-Y Kim +5 more
core +1 more source

