Results 51 to 60 of about 33,830 (312)
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
A hardware Trojan attack protection method for CGRCA configuration bitstream
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
Designing Asymmetric Memristive Behavior in Proton Mixed Conductors for Neuromorphic Applications
Protonic devices that couple ionic and electronic transport are demonstrated as bioinspired neuromorphic elements. The devices exhibit rubber‐like asymmetric memristive behavior with slow voltage‐driven conductance increase and rapid relaxation, enabling simplified read–write operation.
Nada H. A. Besisa +6 more
wiley +1 more source
Geometrically Tunable Scaffold‐Free Muscle Bioconstructs for Treating Volumetric Muscle Loss
Volumetric muscle loss is associated with traumatic muscle resulting in permanent functional impairment. Mold‐based, scaffold‐free, high‐density muscle tissue bioconstructs are developed in customizable geometric shapes and sizes. The transplanted rectangular solid‐shaped muscle bioconstructs improved muscle force recovery and tissue regeneration in ...
Bugra Ayan +8 more
wiley +1 more source
On-Device Power Analysis Across Hardware Security Domains.
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj +1 more source
Bioprinting Organs—Science or Fiction?—A Review From Students to Students
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu +18 more
wiley +1 more source
An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar +3 more
doaj +1 more source
ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli +1 more
doaj +1 more source
Holistic Hardware Security Assessment Framework: A Microarchitectural Perspective [PDF]
Tochukwu Idika, İsmail Aktürk
openalex +1 more source

