Results 71 to 80 of about 1,275,223 (320)

Robust Spectrum Sensing Demonstration Using a Low-Cost Front-End Receiver

open access: yesInternational Journal of Antennas and Propagation, 2015
Spectrum Sensing (SS) is an important function in Cognitive Radio (CR) to detect primary users. The design of SS algorithms is one of the most challenging tasks in CR and requires innovative hardware and software solutions to enhance detection ...
Daniele Borio   +3 more
doaj   +1 more source

Non-commutative Digital Signatures [PDF]

open access: yesarXiv, 2012
The objective of this work is to survey several digital signatures proposed in the last decade using non-commutative groups and rings and propose a digital signature using non-commutative groups and analyze its security.
arxiv  

Shape Memory Polymer‐Based Hook‐and‐Loop Fastener for Robust Bonding and on‐Demand Easy Separation

open access: yesAdvanced Engineering Materials, EarlyView.
A 3D shape memory polymer‐based hook‐and‐loop fastener, fabricated using projection microstereolithography and molding, offers tunable bonding strength through temperature control. When heated from 25 to 70 °C, the fastener softens and deforms easily, reducing bonding strength by 20‐fold for on‐demand easy separation.
Chen Yang   +5 more
wiley   +1 more source

NFT Marketplace [PDF]

open access: yesarXiv, 2023
In an increasingly digitized world, the secure management and trade of digital assets have become a pressing issue. This project aims to address this challenge by developing a decentralized application (dApp) that leverages blockchain technology and deep learning models to provide secure and efficient digital asset management, with a focus on NFTs. The
arxiv  

Online Security in the Middle East and North Africa: A Survey of Perceptions, Knowledge, and Practice [PDF]

open access: yes, 2011
Digital communication has become a more perilous activity, particularly for activists, political dissidents, and independent media. The recent surge in digital activism that has helped to shape the Arab spring has been met with stiff resistance by ...
Ethan Zuckerman   +4 more
core  

Scalable Manufacturing of Radiation‐Tolerant Potentiometric Electrodes: A Systematic Transition from Laboratory to Semiautomated Fabrication

open access: yesAdvanced Engineering Materials, EarlyView.
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao   +4 more
wiley   +1 more source

Light Fields for Face Analysis

open access: yesSensors, 2019
The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ...
Chiara Galdi   +5 more
doaj   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

A Systematic Literature Review of Cyber Security Monitoring in Maritime

open access: yesIEEE Access
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure.
Risto Vaarandi   +4 more
doaj   +1 more source

Key Prediction Security of Keyed Sponges

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation.
Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy