Results 91 to 100 of about 10,775 (222)

Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis

open access: yesChips
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine ...
Will Lillis   +2 more
doaj   +1 more source

Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement

open access: yesTheoria, EarlyView.
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley   +1 more source

Isometric training at longer muscle–tendon complex lengths: A potential countermeasure to impaired neuro‐muscle–tendon function during space travel

open access: yesExperimental Physiology, EarlyView.
Abstract Manned space exploration to distant destinations, including Mars, continues to be an aspiration of humankind. Space travel does, however, present many challenges to the body, amongst which adaptation to microgravity is perhaps the largest. For instance, both short and long manned spaceflight missions have shown substantial deleterious effects ...
Gerard McMahon   +2 more
wiley   +1 more source

Hardware Validation for Semi-Coherent Transmission Security

open access: yesInformation
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher   +2 more
doaj   +1 more source

Active learning strategies in business and information & communication technology engineering higher education: A scoping review

open access: yesReview of Education, Volume 14, Issue 2, August 2026.
Abstract Active learning (AL) has emerged as a pedagogical response to diverse educational challenges across multiple disciplines. This scoping review maps the terrain of AL implementation patterns, examining AL practices in Business Education, Information and Communication Technology (ICT) Engineering, Mathematics, and Statistics from 2015 until the ...
Dubravka Novkovic   +2 more
wiley   +1 more source

How Long Is the Coast of Quantum Chemistry? Or, How to Evaluate Density Functional Theory as a Scientific Revolution

open access: yesNatural Sciences, Volume 6, Issue 3, July 2026.
Within quantum chemistry, density functional theory (DFT) is a revolution. This serves as an example of a multitude of other scientific events, supporting the idea that revolutions are always large, if observed with the appropriate magnification. ABSTRACT Distinguishing scientific revolutions from normal science is a subjective, conflicting matter ...
Sebastian Kozuch
wiley   +1 more source

Machine Learning and Deep Learning Approaches for SQL Injection Detection: A Review

open access: yesNTU Journal of Engineering and Technology
Structured Query Language Injection (SQLi) remains one of the most serious threats to web applications and has the ability to bypass traditional signature-based detection through obfuscation and zero-day payloads.
Sahar Saadallah Ahmed   +1 more
doaj   +1 more source

Computational Modeling of Sequential Dependencies in Mother–Child Social Interaction and Associations to Empathic Responses

open access: yesDevelopmental Science, Volume 29, Issue 4, July 2026.
ABSTRACT Understanding how early mother–child interactions are linked to children's social‐cognitive processes requires methods capable of capturing the temporal structure of naturalistic behavior. This study introduces a computational framework based on Bayesian Network modeling to identify sequential dependencies among nonverbal behaviors (smiles ...
Eleuda Nunez   +5 more
wiley   +1 more source

Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid

open access: yesEnergies
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive.
Daniel Sousa-Dias   +4 more
doaj   +1 more source

Building centaur responders: is emergency management ready for artificial intelligence?

open access: yesDisasters, Volume 50, Issue 3, July 2026.
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy