Results 111 to 120 of about 74,857 (256)
A charge‐domain ternary content‐addressable memory using one capacitor one nanoelectromechanical memory switch (1C‐1N TCAM) is proposed for energy‐efficient, high‐reliability computations. Integrated with the back‐end‐of‐line process, the 1C‐1N TCAM leverages the air gap capacitance to achieve a high capacitance ratio and ternary functionality.
Jin Wook Lee +5 more
wiley +1 more source
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source
Deep Learning Methods for Assessing Time‐Variant Nonlinear Signatures in Clutter Echoes
Motion classification from biosonar echoes in clutter presents a fundamental challenge: extracting structured information from stochastic interference. Deep learning successfully discriminates object speed and direction from bat‐inspired signals, achieving 97% accuracy with frequency‐modulated calls but only 48% with constant‐frequency tones. This work
Ibrahim Eshera +2 more
wiley +1 more source
GAN‐LSTM‐3D: An efficient method for lung tumour 3D reconstruction enhanced by attention‐based LSTM
Abstract Three‐dimensional (3D) image reconstruction of tumours can visualise their structures with precision and high resolution. In this article, GAN‐LSTM‐3D method is proposed for 3D reconstruction of lung cancer tumours from 2D CT images. Our method consists of three phases: lung segmentation, tumour segmentation, and tumour 3D reconstruction. Lung
Lu Hong +12 more
wiley +1 more source
Windowed Hamming Distance-Based Intrusion Detection for the CAN Bus
The use of a Controller Area Network (CAN) bus in the automotive industry for connecting electronic control units (ECUs) poses security vulnerabilities due to the lack of built-in security features.
Siwei Fang +3 more
doaj +1 more source
Abstract Premise Flowers that present their anthers and stigma in close proximity can achieve precise animal‐mediated pollen transfer, but risk self‐pollination. One evolutionary solution is reciprocal herkogamy. Reciprocity of anther and style positions among different plants (i.e., a genetic dimorphism) is common in distylous plants, but very rare in
Steven D. Johnson +5 more
wiley +1 more source
The undetected error probability for shortened hamming codes [PDF]
Hamming or shortened Hamming codes are widely used for error detection in data communications. For example, the CCITT (International Telegraph and Telephone Consultative Committee) recommendation X.25 for packet-switched data networks adopts a distance-4
Costello, D. J., Jr., Lin, S.
core +1 more source
Objective Impaired ability to induce stepping after incomplete spinal cord injury (SCI) can limit the efficacy of locomotor training, often leaving patients wheelchair‐bound. The cuneiform nucleus (CNF), a key mesencephalic locomotor control center, modulates the activity of spinal locomotor centers via the reticulospinal tract.
Anna‐Sophie Hofer +21 more
wiley +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Implementation of a Hamming distance-like genomic quantum classifier using inner products on ibmqx2 and ibmq_16_melbourne. [PDF]
Kathuria K +3 more
europepmc +1 more source

