Results 61 to 70 of about 495,121 (361)

AI‐Driven Defect Engineering for Advanced Thermoelectric Materials

open access: yesAdvanced Materials, EarlyView.
This review presents how AI accelerates the design of defect‐tuned thermoelectric materials. By integrating machine learning with high‐throughput data and physics‐informed representations, it enables efficient prediction of thermoelectric performance from complex defect landscapes.
Chu‐Liang Fu   +9 more
wiley   +1 more source

A mathematical approach towards hardware design [PDF]

open access: yes, 2010
Today the hardware for embedded systems is often specified in VHDL. However, VHDL describes the system at a rather low level, which is cumbersome and may lead to design faults in large real life applications.
Baaij, Christiaan P.R.   +2 more
core   +3 more sources

Organic Ferroelectric Synaptic Transistors for Neural Image Recognition Networks

open access: yesAdvanced Materials Interfaces, EarlyView.
All organic transistors, where both the dielectric and semiconducting layers are polymeric, are developed as electrical synaptic devices. Two copolymers of PVDF as the dielectric layer with large differences in their saturation polarizability and memory window are chosen.
Evan Restuccia   +2 more
wiley   +1 more source

Overview of Hydra: a concurrent language for synchronous digital circuit design [PDF]

open access: yes, 2006
Hydra is a computer hardware description language that integrates several kinds of software tool (simulation, netlist generation and timing analysis) within a single circuit specification. The design language is inherently concurrent, and it offers black
O'Donnell, J.T.
core  

An Abstract Formal Basis for Digital Crowds [PDF]

open access: yes, 2014
Crowdsourcing, together with its related approaches, has become very popular in recent years. All crowdsourcing processes involve the participation of a digital crowd, a large number of people that access a single Internet platform or shared service.
Dennis, Louise A.   +2 more
core   +2 more sources

Optimizing Metamaterial Inverse Design with 3D Conditional Diffusion Model and Data Augmentation

open access: yesAdvanced Materials Technologies, EarlyView.
A generative AI model, the 3D conditional diffusion model (3D‐CDM), is introduced to enhance the inverse design of voxel‐based metamaterials. A data augmentation technique based on topological perturbation expands the dataset, further improving generation quality and accuracy.
Xiaoyang Zheng   +2 more
wiley   +1 more source

Low‐power fast Fourier transform hardware architecture combining a split‐radix butterfly and efficient adder compressors

open access: yesIET Computers & Digital Techniques, 2021
Fast Fourier transform (FFT) is the most common low‐complexity implementation of the discrete Fourier transform, intensively employed to process real‐world signals in smart sensors for the internet of things.
Guilherme Ferreira   +6 more
doaj   +1 more source

Towards An Automated Approach to Hardware/Software Decomposition [PDF]

open access: yes, 2003
We propose in this paper an algebraic approach to hard-ware/software partitioning in Verilog Hardware Description Language (HDL). We explore a collection of algebraic laws for Verilog programs, from which we design a set of syntax-based algebraic rules ...
Chin, Wei Ngan   +2 more
core  

Liquid Metal Sensors for Soft Robots

open access: yesAdvanced Robotics Research, EarlyView.
This review thoroughly reviews liquid metal sensors in soft robots. Their unique material properties like high conductivity and good biocompatibility are analyzed. Working principles are classified, and applications in environmental perception, motion detection, and human—robot interaction are introduced.
Qi Zhang   +7 more
wiley   +1 more source

Optimization of the symmetric encryption mode ECB dedicated to securing medical data [PDF]

open access: yesJournal of Electrical and Electronics Engineering, 2021
Data security is a recurring problem to protected the private life of users, Data encryption is necessary but also delicate step to ensure at the same time speed and security of transmission and reception data, there are different models of cryptography ...
SEGHIRI Naouel   +2 more
doaj  

Home - About - Disclaimer - Privacy