Results 21 to 30 of about 398 (99)
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud+4 more
wiley +1 more source
Factors Influencing the Binding of HIV‐1 Protease Inhibitors: Insights from Machine Learning Models
Machine learning unlocks the secrets of HIV‐1 protease inhibition, paving the way for data‐driven antiviral drug design. This study analyzes crystallographic data from hundreds of protein–ligand complexes, predicting ligand binding affinity with over 85% accuracy.
Yaffa Shalit, Inbal Tuvi‐Arad
wiley +1 more source
Late season frosts and changing snowpack may exacerbate human–bear conflicts
Abstract The North American black bear (Ursus americanus) is an opportunistic omnivore that depends on seasonal availability of fruits, nuts, grasses, and forbs for survival. Black bears on the urban–wildland interface also use anthropogenic food resources, especially when natural food resources are scarce.
Kevin T. Shoemaker+7 more
wiley +1 more source
Energy‐Aware RF Fingerprinting for Device Identification in Ultra‐Low‐Power IoT Systems
We propose an energy‐aware RF fingerprinting method for ultra‐low‐power IoT using two deep learning models. RFNet achieves 97.48% accuracy while TinyRFNet reaches 93.19% with far fewer parameters. Dynamic model selection by battery level and confidence yields 94.54% accuracy and 17% energy savings.
Emmanuel Osei Owusu+4 more
wiley +1 more source
Towards Sustainable IoT: A Digital Signature‐Enhanced Federated Learning Approach
ABSTRACT Federated Learning (FL) is emerging as a premier paradigm for privacy‐preserved Machine Learning (ML), enabling devices to train models without central data pooling collaboratively. In the contemporary Internet of Things (IoT) landscape, characterized by escalating energy consumption and associated carbon footprint, FL is recognized not merely
Shahida Hafeezan Qureshi+5 more
wiley +1 more source
ABSTRACT With the increasing reliance on the Internet of Things devices in various fields, especially in smart homes or smart factories, concerns are increasing about cyber threats targeting intrusion detection systems that protect Internet of Things (IoT) networks.
Zaed S. Mahdi+2 more
wiley +1 more source
ABSTRACT Blockchain (BC) systems are increasingly used by consortia to monitor ex‐post opportunism in food supply chains. BC systems differ for BC technical characteristics, complementary technologies, and organizational tools. Yet, little is empirically known about the link between different BC system designs and the context where they are implemented
Pamela Danese, Pietro Romano
wiley +1 more source
Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi+4 more
wiley +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source
Michelson Interferometric Methods for Full Optical Complex Convolution. [PDF]
Kang H+7 more
europepmc +1 more source