Results 111 to 120 of about 2,442,732 (352)

Adaptive Machine Learning for Electronic Nose‐Based Forensic VOC Classification

open access: yesAdvanced Science, EarlyView.
A 32‐element electronic nose enhanced with machine learning demonstrates exceptional accuracy in differentiating between living and deceased individuals (98.1%), discriminating human and animal specimens (97.2%), and estimating postmortem intervals.
Ivan Shtepliuk   +3 more
wiley   +1 more source

Survey of research on confidential computing

open access: yesIET Communications
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng   +5 more
doaj   +1 more source

Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs

open access: yesCryptography
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables
Jaya Dofe   +3 more
doaj   +1 more source

Random-telegraph-noise-enabled true random number generator for hardware security. [PDF]

open access: yesSci Rep, 2020
Brown J   +6 more
europepmc   +1 more source

Label‐Free Single‐Molecule Immunoassay

open access: yesAdvanced Science, EarlyView.
Label‐free single‐molecule immunoassay (LFSMiA) enables ultra‐sensitive and wide dynamic range protein detection in whole blood samples. LFSMiA features real‐time single‐molecule imaging by plasmonic scattering microscopy, background reduction by a 2‐step sandwich assay, minimizing matrix effect by dynamic tracking of single binding events, and ...
Xiaoyan Zhou   +11 more
wiley   +1 more source

Identification of digital device hardware vulnerabilities based on scanning systems and semi-natural modeling

open access: yesРоссийский технологический журнал
Objectives. The development of computer technology and information systems requires the consideration of issues of their security, various methods for detecting hardware vulnerabilities of digital device components, as well as protection against ...
E. F. Pevtsov   +3 more
doaj   +1 more source

Upper Limb Motor Function Rehabilitation System Leveraging Pressure‐Sensitive Intent Recognition

open access: yesAdvanced Science, EarlyView.
A novel upper limb rehabilitation system for stroke patients combines liquid metal elastomer sensors with functional electrical stimulation (FES). By automatically adjusting stimulation intensity based on real‐time muscle force signals, the system enhances wrist movement capability (14° to 47° elevation) and aids neural recovery through heightened ...
Zhiwei Hu   +9 more
wiley   +1 more source

Basic Approaches to Testing of Multifunctional Hardware Software Information Security Tools

open access: yesБезопасность информационных технологий, 2011
This paper aims of developing the technique of complex testing of multifunctional hardware-software information security tools based on hardware-software unites of trusted boot which enables testing of functional security while providing for the desired ...
E. A. Belyaeva
doaj  

Home - About - Disclaimer - Privacy