Results 31 to 40 of about 1,340 (116)

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Straddle carrier routing optimization at container terminals utilizing telemetry‐based prediction

open access: yesInternational Transactions in Operational Research, EarlyView.
Abstract Efficient vehicle routing and scheduling for horizontal transport means on container terminals can reduce lead times and travel distances, resulting in fuel savings and productivity gains. We apply machine learning to emulate operational processes, bridging the gap between theoretical optimization models and real‐world practices at container ...
Julian Neugebauer   +3 more
wiley   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Physical-Layer Security in Mixed UOWC-RF Networks With Energy Harvesting Relay Against Multiple Eavesdroppers

open access: yesIEEE Open Journal of the Communications Society
In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward
Moloy Kumar Ghosh   +9 more
doaj   +1 more source

TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement [PDF]

open access: yes, 2017
In this paper, a transmit antenna selection (TAS)- based incremental hybrid decode-amplify-forward (IHDAF) scheme is proposed to enhance physical layer security in cooperative relay networks.
Feng, Youhong   +4 more
core   +1 more source

Making Machine Learning Accessible for Developmental Science: The Case of Automated Face Detection

open access: yesDevelopmental Science, Volume 29, Issue 3, May 2026.
ABSTRACT The last decade has seen rapid advancements in machine learning, significantly transforming fields like cybersecurity and healthcare. Developmental science has been slower to adopt these technologies. Yet, machine learning holds immense potential to transform this field, enabling scalable and data‐driven insights into developmental processes ...
Teodor Y. Nikolov   +5 more
wiley   +1 more source

A critical review of porous adsorbents for air separation: From fundamental insights to rational adsorbent design

open access: yesAIChE Journal, Volume 72, Issue 4, April 2026.
Abstract Air separation via selective adsorption using porous adsorbents offers energy‐efficient alternatives to cryogenic distillation for producing high‐purity O2 and N2. Adsorbent efficacy depends on balancing selectivity, durability, and performance consistency across varying conditions. This comprehensive review critically discusses the design and
Tianqi Wang   +9 more
wiley   +1 more source

Comparative Amplicon and Shotgun Metagenome Profiling of Soil Microbial Communities in Kauri Forests Affected by Phytophthora agathidicida

open access: yesEnvironmental Microbiology Reports, Volume 18, Issue 2, April 2026.
Soils beneath symptomatic and asymptomatic kauri trees were analysed using LAMP, amplicon sequencing, shotgun metagenomics, and PICRUSt2. LAMP detected Phytophthora agathidicida in 39/60 samples, while shotgun metagenomics detected it at low abundance across all samples.
Zoe King   +6 more
wiley   +1 more source

Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

open access: yesIEEE Access
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti   +1 more
doaj   +1 more source

Using miniaturized laboratory equipment and DNA barcoding to improve conservation genetics training and identify illegally traded species

open access: yesConservation Biology, Volume 40, Issue 2, April 2026.
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy