Results 101 to 110 of about 10,775 (222)

SAF-PUF: A Strong PUF with Zero-BER, ML-Resilience and Dynamic Key Concealment Enabled by RRAM Stuck-at-Faults

open access: yesApplied Sciences
Targeting resource-constrained Internet of Things (IoT) devices, this paper proposes Stuck-at-Fault Physical Unclonable Function (SAF-PUF), a lightweight Resistive Random-Access Memory (RRAM)-based PUF that exploits the intrinsic addresses of ...
Qianwu Zhang   +3 more
doaj   +1 more source

A Resource Efficient Ising Model‐Based Quantum Sudoku Solver

open access: yesSoftware: Practice and Experience, Volume 56, Issue 6, Page 643-657, June 2026.
ABSTRACT Background Quantum algorithms exploit superposition and parallelism to address complex combinatorial problems, many of which fall into the non‐polynomial (NP) class. Sudoku, a widely known logic‐based puzzle, is proven to be NP‐complete and thus presents a suitable testbed for exploring quantum optimization approaches.
Wen‐Li Wang   +5 more
wiley   +1 more source

Open Innovation With Maker Communities: Exploring Collaboration Motives and Preferences of Makers

open access: yesR&D Management, Volume 56, Issue 3, Page 496-518, June 2026.
ABSTRACT Companies constantly seek new ways to innovate and integrate external knowledge into their innovation processes. In the era of makerspaces, a new source for collaborative innovation has evolved. As research shows, the users of makerspaces, so‐called makers, tend to be highly creative and innovative.
David Zakoth   +2 more
wiley   +1 more source

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, Volume 13, Issue 26, 8 May 2026.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

VAE+DDPG: An Attention‐Enhanced Variational Autoencoder for Deep Reinforcement Learning‐Based Autonomous Navigation in Low‐Light Environments

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 5, May 2026.
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee   +7 more
wiley   +1 more source

Quantum biology: From mechanisms to medicine

open access: yesClinical and Translational Medicine, Volume 16, Issue 5, May 2026.
Quantum biology across systems: from mechanisms to medicine. This graphical abstract highlights how quantum phenomena‐coherence, tunnelling and spin dynamics‐shape fundamental biological processes and point towards quantum‐informed medicine. In photosynthesis, quantum coherence supports near‐lossless exciton transport across pigment–protein complexes ...
Ji‐Yong Sung, Jae‐Ho Cheong
wiley   +1 more source

An Explainable and Carbon‐Aware Stacked Ensemble Model for Phishing and Impersonation Detection in Online Social Networks

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat   +5 more
wiley   +1 more source

Neuromorphic audio in image steganography using spiking neural networks for secure and energy efficient data hiding

open access: yesDiscover Computing
Secure data obfuscation requires balancing perceptual transparency, computational efficiency, and architectural deployability. Conventional spatial-domain steganography achieves high capacity but lacks structural abstraction and hardware-oriented design.
Biswajit Kumar Sahoo   +4 more
doaj   +1 more source

LWARX: Lightweight ARX white-box cipher for satellite communications

open access: yesJournal of King Saud University: Computer and Information Sciences
Satellite communication links are vulnerable to attacks due to the lack of necessary security protection and can be considered as a white-box environment.
Yatao Yang   +4 more
doaj   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Home - About - Disclaimer - Privacy