Results 21 to 30 of about 6,943 (308)
FPGA-based dual-layer authentication scheme utilizing AES and ECC for unmanned aerial vehicles
Unmanned aerial vehicles, commonly known as drones, face unique authentication challenges due to their distinct characteristics and operational environments.
Kumar Sekhar Roy +4 more
doaj +1 more source
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Many-body computing on Field Programmable Gate Arrays
Improving many-body computational efficiency is crucial for exploring condensed matter systems. However, existing acceleration methods are limited and mostly based on von Neumann-like architectures. Here we leverage the capabilities of Field Programmable
Songtai Lv +7 more
doaj +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Reconfigurable Three‐Dimensional Superconducting Nanoarchitectures
3D superconducting nanostructures offer new possibilities for emergent physical phenomena. However, fabricating complex geometries remains challenging. Here 3D nanoprinting of complex 3D superconducting nanoarchitectures is established. As well as propagating superconducting vortices in 3D, anisotropic superconducting properties with geometric ...
Elina Zhakina +11 more
wiley +1 more source
Analysis and Comparison of FPGA-Based Histogram of Oriented Gradients Implementations
One of the commonly-used feature extraction algorithms in computer vision is the histogram of oriented gradients. Extracting the features from an image using this algorithm requires a large amount of computations.
Sina Ghaffari +3 more
doaj +1 more source
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Modern electronic systems usually use third‐party IP cores to build basic blocks. However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem.
Ying Zhang +4 more
doaj +1 more source
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source
The security of data is a major concern in this digital era. In general text and image data are well protected with the help of existing standards, meanwhile, securing voice communications is a challenging task.
Keshav Kumar +2 more
doaj +1 more source
A frequency‐tunable ferroelectric synaptic transistor based on a buried‐gate InGaZnO channel and Al2O3/HfO2 dielectric stack exhibits linear and reversible weight updates using single‐polarity pulses. By switching between ferroelectric and trap‐assisted modes depending on input frequency, the device simplifies neuromorphic circuit design and achieves ...
Ojun Kwon +8 more
wiley +1 more source

