Results 171 to 180 of about 333,660 (280)

Effect of Metal–Metal Distance on the Performance of Dual‐Atom Catalysts for the Oxygen Reduction Reaction: A Density Functional Theory and Micro‐kinetics Study

open access: yesSmall, EarlyView.
Density functional theory calculations and microkinetic modeling were carried out on 108 dual‐atom catalysts with varied metalmetal distances ranging from 2.2 to 3.5 Å. The results reveal that moderate spacing of around 3.0 Å promotes bridging oxygen adsorption and dissociative reduction pathways, weakens the hydroxylhydroperoxyl scaling relationship ...
Yu Mao   +7 more
wiley   +1 more source

Interpretable CRAM‑Enhanced Lightweight Dual‑Branch CNN for Real‑Time Breast Cancer Histopathology in Internet‑of‑Medical‑Things Environments

open access: yesSmall, EarlyView.
This study presents an interpretable, lightweight hybrid deep learning model for real‐time analysis of breast cancer histopathology in IoMT‐enabled diagnostic systems. By integrating MobileNetV2 and EfficientNet‐B0 with a novel contextual recurrent attention module (CRAM), the framework achieves near‐perfect accuracy while providing transparent Grad ...
Roseline Oluwaseun Ogundokun   +4 more
wiley   +1 more source

A Resource Efficient Ising Model‐Based Quantum Sudoku Solver

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Quantum algorithms exploit superposition and parallelism to address complex combinatorial problems, many of which fall into the non‐polynomial (NP) class. Sudoku, a widely known logic‐based puzzle, is proven to be NP‐complete and thus presents a suitable testbed for exploring quantum optimization approaches.
Wen‐Li Wang   +5 more
wiley   +1 more source

Converting an Integer to a Decimal String in Under Two Nanoseconds

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Objective Converting binary integers to variable‐length decimal strings is a fundamental operation in computing. Conventional fast approaches rely on recursive division and small lookup tables. The goal of this work is to develop a significantly faster method for this task.
Jaël Champagne Gareau, Daniel Lemire
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy