Results 101 to 110 of about 776,400 (220)

Implementing Reproducible Fisheries Research: A Decade of Experience With the Kahawai Reporting System

open access: yesJournal of the Royal Society of New Zealand, Volume 56, Issue 1, February 2026.
Scientific publishing is widely perceived to be in a state of crisis. A contributing factor is reproducibility: the extent to which the results can be replicated is key to assessing the reliability of a study. Reproducibility rates have often been found to be low, a situation complicated by the fact that many studies provide insufficient details of ...
David A. J. Middleton   +3 more
wiley   +1 more source

Towards scalable insect monitoring: Ultra‐lightweight CNNs as on‐device triggers for insect camera traps

open access: yesMethods in Ecology and Evolution, Volume 17, Issue 2, Page 357-370, February 2026.
Abstract Camera traps, combined with AI, have emerged to achieve automated, scalable biodiversity monitoring. However, passive infrared (PIR) sensors that typically trigger camera traps are poorly suited for detecting small, fast‐moving ectotherms such as insects. Insects comprise over half of all animal species and are key components of ecosystems and
Ross J. Gardiner   +2 more
wiley   +1 more source

Persistent Postural‐Perceptual Dizziness: A Practical Approach to Diagnosis and Patient Communication

open access: yesEuropean Journal of Neurology, Volume 33, Issue 2, February 2026.
ABSTRACT Background Despite clear diagnostic criteria established in 2017, delivering and explaining the diagnosis of persistent postural‐perceptual dizziness (PPPD) can be challenging. Methods We outline a step‐by‐step approach to clearly explain the diagnosis, underlying mechanisms and treatment options to patients with PPPD, followed by a brief ...
Hüseyin Nezih Özdemir   +5 more
wiley   +1 more source

An Economic Analysis of Difficulty Adjustment Algorithms in Proof‐of‐Work Blockchain Systems

open access: yesInternational Economic Review, Volume 67, Issue 1, Page 259-285, February 2026.
ABSTRACT We study the stability of cryptocurrency systems through difficulty adjustment. Bitcoin's difficulty adjustment algorithm (DAA) exhibits instability when the reward elasticity of the hash rate is high, implying that a sharp price reduction could disrupt the current Bitcoin system.
Shunya Noda   +2 more
wiley   +1 more source

LWARX: Lightweight ARX white-box cipher for satellite communications

open access: yesJournal of King Saud University: Computer and Information Sciences
Satellite communication links are vulnerable to attacks due to the lack of necessary security protection and can be considered as a white-box environment.
Yatao Yang   +4 more
doaj   +1 more source

Omni Geometry Representation Learning Versus Large Language Models for Geospatial Entity Resolution

open access: yesTransactions in GIS, Volume 30, Issue 1, February 2026.
ABSTRACT The development, integration, and maintenance of geospatial databases rely heavily on efficient and accurate matching procedures of Geospatial Entity Resolution (ER). While resolution of points‐of‐interest (POIs) has been widely addressed, resolution of entities with diverse geometries has been largely overlooked.
Kalana Wijegunarathna   +2 more
wiley   +1 more source

Physical cryptography and security of digital devices

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The article presents the main scientific results and practical achievements obtained by undergraduate and graduate students of Computer Science department of BSUIR under the supervision of professor A.A. Ivaniuk during the period from 2014 to 2018.
A. A. Ivaniuk, S. S. Zalivaka
doaj  

Refined Analytical EM Model of IC-Internal Shielding for Hardware-Security and Intra-Device Simulative Framework

open access: yesIEEE Access
Over the past two decades, the prominence of physical attacks on electronic devices, designed to extract confidential information, has surged. These attacks exploit the inherent physical characteristics of integrated circuits (ICs), leading to ...
Edut Katz, Moshe Avital, Itamar Levi
doaj   +1 more source

Guest Editorial: Hardware Reverse Engineering and Obfuscation [PDF]

open access: yesJournal of Hardware and Systems Security, 2018
Domenic Forte, Yousef Iskander
openaire   +1 more source

Home - About - Disclaimer - Privacy