Results 31 to 40 of about 1,340 (116)
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
Straddle carrier routing optimization at container terminals utilizing telemetry‐based prediction
Abstract Efficient vehicle routing and scheduling for horizontal transport means on container terminals can reduce lead times and travel distances, resulting in fuel savings and productivity gains. We apply machine learning to emulate operational processes, bridging the gap between theoretical optimization models and real‐world practices at container ...
Julian Neugebauer +3 more
wiley +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward
Moloy Kumar Ghosh +9 more
doaj +1 more source
TAS-Based Incremental Hybrid Decode–Amplify–Forward Relaying for Physical Layer Security Enhancement [PDF]
In this paper, a transmit antenna selection (TAS)- based incremental hybrid decode-amplify-forward (IHDAF) scheme is proposed to enhance physical layer security in cooperative relay networks.
Feng, Youhong +4 more
core +1 more source
Making Machine Learning Accessible for Developmental Science: The Case of Automated Face Detection
ABSTRACT The last decade has seen rapid advancements in machine learning, significantly transforming fields like cybersecurity and healthcare. Developmental science has been slower to adopt these technologies. Yet, machine learning holds immense potential to transform this field, enabling scalable and data‐driven insights into developmental processes ...
Teodor Y. Nikolov +5 more
wiley +1 more source
Abstract Air separation via selective adsorption using porous adsorbents offers energy‐efficient alternatives to cryogenic distillation for producing high‐purity O2 and N2. Adsorbent efficacy depends on balancing selectivity, durability, and performance consistency across varying conditions. This comprehensive review critically discusses the design and
Tianqi Wang +9 more
wiley +1 more source
Soils beneath symptomatic and asymptomatic kauri trees were analysed using LAMP, amplicon sequencing, shotgun metagenomics, and PICRUSt2. LAMP detected Phytophthora agathidicida in 39/60 samples, while shotgun metagenomics detected it at low abundance across all samples.
Zoe King +6 more
wiley +1 more source
Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti +1 more
doaj +1 more source
Abstract Illegal wildlife trade (IWT) is one of the largest global illegal activities, and it negatively affects biodiversity and sustainable development worldwide. DNA barcoding coupled with high‐throughput sequencing (i.e., metabarcoding) is useful in identifying taxa affected by IWT and has been used routinely for decades.
Maria Joana Ferreira da Silva +9 more
wiley +1 more source

