Results 101 to 110 of about 3,073,944 (343)

Cross Domain Early Crop Mapping with Label Spaces Discrepancies using MultiCropGAN [PDF]

open access: yesISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Mapping target crops before the harvest season for regions lacking crop-specific ground truth is critical for global food security. Utilizing multispectral remote sensing and domain adaptation methods, prior studies strive to produce precise crop maps in
Y. Wang, H. Huang, R. State
doaj   +1 more source

Data security for third generation telecommunication systems [PDF]

open access: yes
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core  

Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]

open access: yes, 2019
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core   +2 more sources

Large Area, Cost‐Effective, and Ultra‐Fast Fabrication of Mini‐Coils Toward Noninvasive Magnetic Applications

open access: yesAdvanced Engineering Materials, EarlyView.
A simple, cleanroom‐free method produces flexible mini‐coils using automated blade cutting. The process is fast, low‐cost, and supports diverse materials. The coils show strong durability and performance under repeated bending. Demonstrated use in resistor‐inductor filters and magnetic nanoparticle control proves their adaptability.
Changhao Ge   +5 more
wiley   +1 more source

A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)

open access: yesIEEE Transactions on Quantum Engineering
In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model.
Qing Zhou   +3 more
doaj   +1 more source

Impact of Structural Adhesive Hybridization Strategy on the Performance of In‐Mold Electronics Devices Across Thermoforming and Injection Molding

open access: yesAdvanced Engineering Materials, EarlyView.
In‐mold electronics (IME) undergo complex thermoforming and over‐molding processes that strain device integrity. This study demonstrates how adapting the amount and placement of structural adhesive to local deformation levels preserves electrical functionality.
Francisco Ituriel Arias‐García   +3 more
wiley   +1 more source

Report on the IBM data security study [PDF]

open access: bronze, 1974
Lee Danner   +3 more
openalex   +1 more source

3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht   +5 more
wiley   +1 more source

A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))

open access: yesCAAI Transactions on Intelligence Technology
In traditional secret image sharing schemes, a secret image is shared among shareholders who have the same position. But if the shareholders have two different positions, essential and non‐essential, it is necessary to use essential secret image sharing ...
Massoud Hadian Dehkordi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy