Results 111 to 120 of about 10,775 (222)

Physical cryptography and security of digital devices

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The article presents the main scientific results and practical achievements obtained by undergraduate and graduate students of Computer Science department of BSUIR under the supervision of professor A.A. Ivaniuk during the period from 2014 to 2018.
A. A. Ivaniuk, S. S. Zalivaka
doaj  

Extended Reality in Rehabilitation Medicine: A Systematic Review

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims This systematic review synthesizes current evidence on the application of extended reality (XR) technologies, comprising virtual reality (VR), augmented reality (AR), and mixed reality (MR), in rehabilitation medicine, assessing their effects across diverse rehabilitation domains and clinical outcomes.
Jie Hao, Yao Yao, Ka‐Chun Siu
wiley   +1 more source

USING WIRELESS NETWORKS FOR MONITORING AND RECOGNITION OF OBJECTS: A REVIEW OF PATENT SOLUTIONS

open access: yesБезопасность информационных технологий
Analysis of IEEE 802.11 radio signal parameter variations opens up new possibilities for object monitoring and recognition without the need to deploy additional infrastructure. This article provides a review of patent solutions from the period 2020–2025,
Aleksandr I. Saraikin   +2 more
doaj   +1 more source

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Automated Hardware Logic Obfuscation Framework Using GPT

open access: yes2024 IEEE 17th Dallas Circuits and Systems Conference (DCAS)
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process.
Banafsheh Saber Latibari   +7 more
openaire   +2 more sources

The virus lesson: Teaching viral structure and quasi‐symmetry in mixed reality

open access: yesProtein Science, Volume 35, Issue 5, May 2026.
Abstract Traditional approaches to teaching structural biology struggle to capture the dynamic, three‐dimensional nature of biomolecular structures. Viral capsids, which employ quasi‐symmetric arrangements, are especially difficult to conceptualize at the human scale.
Adam Gardner   +4 more
wiley   +1 more source

Refined Analytical EM Model of IC-Internal Shielding for Hardware-Security and Intra-Device Simulative Framework

open access: yesIEEE Access
Over the past two decades, the prominence of physical attacks on electronic devices, designed to extract confidential information, has surged. These attacks exploit the inherent physical characteristics of integrated circuits (ICs), leading to ...
Edut Katz, Moshe Avital, Itamar Levi
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

AI as guru or conjurer?

open access: yesAmerican Ethnologist, Volume 53, Issue 2, Page 136-141, May 2026.
Abstract This commentary examines how artificial intelligence (AI) reshapes scholarly authorship through Fredrik Barth's figures of the guru and the conjurer. The guru instructs within moral and scholarly frameworks, while the conjurer mystifies through spectacle.
Jaap Timmer, Anna‐Karina Hermkens
wiley   +1 more source

Language machines: Toward a linguistic anthropology of large language models

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Large language models (LLMs) challenge long‐standing assumptions in linguistics and linguistic anthropology by generating human‐like language without relying on rule‐based structures. This introduction to the special issue Language Machines calls for renewed engagement with LLMs as socially embedded language technologies.
Siri Lamoureaux   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy