Results 61 to 70 of about 139,929 (306)
FPGA-Based Hardware Encryption of Power Line Patrol Drones
Communication of power line patrol UAV is currently protected with frequency hopping. However, malicious adversaries can steal sequence of frequency hopping and control the patrol UAV. In view of the security protection needs of patrol UAV in the process
Hao LUO +4 more
doaj +1 more source
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices.
Asokan, N. +7 more
core +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333.
Dordowsky, Frank
core +2 more sources
An overview of design principles and scalable fabrication strategies for multifunctional bio‐based packaging. Radiative cooling films, modified‐atmosphere films/membranes, active antimicrobial/antioxidant platforms, intelligent optical/electrochemical labels, and superhydrophobic surfaces are co‐engineered from material chemistry to mesoscale structure
Lei Zhang +6 more
wiley +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
Securing Real-Time Internet-of-Things
Modern embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.).
Chen, Chien-Ying +2 more
core +1 more source
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane +4 more
wiley +1 more source
The Design of a System Architecture for Mobile Multimedia Computers [PDF]
This chapter discusses the system architecture of a portable computer, called Mobile Digital Companion, which provides support for handling multimedia applications energy efficiently.
Havinga, Paul Johannes Mattheus
core +3 more sources
This work establishes a framework for high‐resolution printed interconnects by coupling e‐jet printing control, multilayer deposition, and sintering optimization. Ink properties and printing speed influence particle stacking, while different sintering atmospheres drive distinct microstructural evolution.
Kaifan Yue +6 more
wiley +1 more source

