Results 141 to 150 of about 22,224 (372)

Fuzz

open access: yes, 1985
Publicació alternativa ...
openaire   +1 more source

Automated Feature Extraction and Classification of Submerged Cultural Heritage Assets in the Puck Lagoon via Multisensor Remote Sensing

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT This study presents a strong framework for the detection and classification of Submerged Cultural Heritage Assets (SCHA) in shallow marine environments using the integration of multibeam echosounder and airborne LiDAR bathymetry with object‐based image analysis and fuzzy logic–based classification.
Łukasz Janowski   +4 more
wiley   +1 more source

Coherence‐Gated Wrapped‐Phase InSAR With Matrix‐Based Uncertainty Diagnostics for Burial‐Mound Hotspot Ranking (Sicily, Italy)

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT Burial mounds are key elements of Mediterranean funerary landscapes, but in intensively cultivated coastal plains their low‐relief expression is easily obscured by ploughing, levelling and rapidly changing surface conditions, making single‐date observations unreliable.
Salvatore Polverino   +2 more
wiley   +1 more source

Data, not documents: Moving beyond theories of information‐seeking behavior to advance data discovery

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 649-664, April 2025.
Abstract Many theories of human information behavior (HIB) assume that information objects are in text document format. This paper argues four important HIB theories are insufficient for describing users' search strategies for data because of assumptions about the attributes of objects that users seek.
Anthony J. Million   +3 more
wiley   +1 more source

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

Wearable exoskeleton robot control using radial basis function‐based fixed‐time terminal sliding mode with prescribed performance

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper tackles the problem of robust and accurate fixed‐time tracking in human–robot interaction and deals with uncertainties. This work introduces a control approach for a wearable exoskeleton designed specifically for rehabilitation tasks.
Mahmoud Abdallah   +4 more
wiley   +1 more source

Rare Path Guided Fuzzing

open access: gold, 2023
Seemanta Saha   +6 more
openalex   +1 more source

Modeling and parameter estimation for fractional large‐scale interconnected Hammerstein systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper addresses the challenge of modeling and identifying large‐scale interconnected systems exhibiting memory effects, hereditary properties, and non‐local interactions. We propose a fractional‐order extension of the Hammerstein architecture that incorporates Grünwald–Letnikov operators to capture complex dynamics through multiple ...
Mourad Elloumi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy