Results 51 to 60 of about 33,830 (312)

Smarter Sensors Through Machine Learning: Historical Insights and Emerging Trends across Sensor Technologies

open access: yesAdvanced Functional Materials, EarlyView.
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee   +17 more
wiley   +1 more source

A hardware Trojan attack protection method for CGRCA configuration bitstream

open access: yesDianzi Jishu Yingyong, 2019
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj   +1 more source

In Materia Shaping of Randomness with a Standard Complementary Metal‐Oxide‐Semiconductor Transistor for Task‐Adaptive Entropy Generation

open access: yesAdvanced Functional Materials, EarlyView.
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak   +14 more
wiley   +1 more source

Designing Asymmetric Memristive Behavior in Proton Mixed Conductors for Neuromorphic Applications

open access: yesAdvanced Functional Materials, EarlyView.
Protonic devices that couple ionic and electronic transport are demonstrated as bioinspired neuromorphic elements. The devices exhibit rubber‐like asymmetric memristive behavior with slow voltage‐driven conductance increase and rapid relaxation, enabling simplified read–write operation.
Nada H. A. Besisa   +6 more
wiley   +1 more source

Geometrically Tunable Scaffold‐Free Muscle Bioconstructs for Treating Volumetric Muscle Loss

open access: yesAdvanced Healthcare Materials, EarlyView.
Volumetric muscle loss is associated with traumatic muscle resulting in permanent functional impairment. Mold‐based, scaffold‐free, high‐density muscle tissue bioconstructs are developed in customizable geometric shapes and sizes. The transplanted rectangular solid‐shaped muscle bioconstructs improved muscle force recovery and tissue regeneration in ...
Bugra Ayan   +8 more
wiley   +1 more source

On-Device Power Analysis Across Hardware Security Domains.

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj   +1 more source

Bioprinting Organs—Science or Fiction?—A Review From Students to Students

open access: yesAdvanced Healthcare Materials, EarlyView.
Bioprinting artificial organs has the potential to revolutionize the medical field. This is a comprehensive review of the bioprinting workflow delving into the latest advancements in bioinks, materials and bioprinting techniques, exploring the critical stages of tissue maturation and functionality.
Nicoletta Murenu   +18 more
wiley   +1 more source

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

open access: yesIoT
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar   +3 more
doaj   +1 more source

ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY

open access: yesIraqi Journal for Computers and Informatics, 2020
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy