Results 71 to 80 of about 522,468 (334)

Smarter Sensors Through Machine Learning: Historical Insights and Emerging Trends across Sensor Technologies

open access: yesAdvanced Functional Materials, EarlyView.
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee   +17 more
wiley   +1 more source

In Materia Shaping of Randomness with a Standard Complementary Metal‐Oxide‐Semiconductor Transistor for Task‐Adaptive Entropy Generation

open access: yesAdvanced Functional Materials, EarlyView.
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak   +14 more
wiley   +1 more source

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

Designing Asymmetric Memristive Behavior in Proton Mixed Conductors for Neuromorphic Applications

open access: yesAdvanced Functional Materials, EarlyView.
Protonic devices that couple ionic and electronic transport are demonstrated as bioinspired neuromorphic elements. The devices exhibit rubber‐like asymmetric memristive behavior with slow voltage‐driven conductance increase and rapid relaxation, enabling simplified read–write operation.
Nada H. A. Besisa   +6 more
wiley   +1 more source

A hardware Trojan attack protection method for CGRCA configuration bitstream

open access: yesDianzi Jishu Yingyong, 2019
A protection method based on authentication and encryption hardware security engine is proposed as the reconfigurable device configuration bitstream is vulnerable to hardware Trojan attacks.
Liu Min, Yan Yingjian, Nan Longmei
doaj   +1 more source

MAGTWIST: A Magnetically‐Driven Rotary Actuator Using a Traveling‐Wave With Integrated Stiffness Tunability

open access: yesAdvanced Functional Materials, EarlyView.
MAGTWIST: A compact magnetic rotary actuator, enabling smooth, stepless rotation, and on‐demand locking. Inspired by peristalsis, a soft polymer belt generates a traveling‐wave, enabling 270° rotation when heated. Cooling stiffens the belt, locking it in position and enabling it to withstand high loads.
Simon Frieler   +3 more
wiley   +1 more source

On-Device Power Analysis Across Hardware Security Domains.

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj   +1 more source

Geometrically Tunable Scaffold‐Free Muscle Bioconstructs for Treating Volumetric Muscle Loss

open access: yesAdvanced Healthcare Materials, EarlyView.
Volumetric muscle loss is associated with traumatic muscle resulting in permanent functional impairment. Mold‐based, scaffold‐free, high‐density muscle tissue bioconstructs are developed in customizable geometric shapes and sizes. The transplanted rectangular solid‐shaped muscle bioconstructs improved muscle force recovery and tissue regeneration in ...
Bugra Ayan   +8 more
wiley   +1 more source

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

open access: yesIoT
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar   +3 more
doaj   +1 more source

ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY

open access: yesIraqi Journal for Computers and Informatics, 2020
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy