Results 101 to 110 of about 1,798,077 (286)
Speech Bandwidth Extension Using DWT-FFT-Based Data Hiding [PDF]
A novel transform-domain speech bandwidth extension algorithm is proposed to transmit information about the missing speech frequencies over a hidden channel, i.e., the related encoded spectral envelope parameters are hidden within the narrowband speech ...
P. Kurada +2 more
doaj
The hidden role of Cd segregation at grain boundaries is revealed in p‐type Mg3Sb2 by atom probe tomography and other advanced characterizations. Grain boundary Cd enrichment suppresses the SbMg+ hole‐killer formation and lowers potential barriers, enhancing electrical conductivity.
Zhou Li +12 more
wiley +1 more source
On contractual solutions to hold-up problems with quality uncertainty and unobservable investments [PDF]
A seller and a buyer can write a contract. After that, the seller produces a good. She can influence the expected quality of the good by making unobservable investments. Only the seller learns the realized quality. Finally, trade can occur.
Schmitz, Patrick W.
core +1 more source
Flexible piezoresistive pressure sensors underpin wearable and soft electronics. This review links sensing physics, including contact resistance modulation, quantum tunneling and percolation, to unified materials/structure design. We highlight composite and graded architectures, interfacial/porous engineering, and microstructured 3D conductive networks
Feng Luo +2 more
wiley +1 more source
Estimating the Information Extracted by a Single Spiking Neuron from a Continuous Input Time Series
Understanding the relation between (sensory) stimuli and the activity of neurons (i.e., “the neural code”) lies at heart of understanding the computational properties of the brain. However, quantifying the information between a stimulus and a spike train
Fleur Zeldenrust +5 more
doaj +1 more source
Circulating Cell-Free DNA in Breast Cancer: Searching for Hidden Information towards Precision Medicine. [PDF]
Panagopoulou M, Esteller M, Chatzaki E.
europepmc +1 more source
Relationship lending: Is it Incentives or hidden information? [PDF]
Relationships are a valuable technology to produce loans. (Berger and Udell [1995], Petersen and Rajan [1994], Aoki and Dinç [2002]). While there are convincing theories in which relationships solve hidden action or hidden information problems, there is ...
João Manoel Pinho de Mello +1 more
core
Hydrogen‐Bond–Driven Ion Retention in Electrolyte‐Gated Synaptic Transistors
Anion molecular design governs ion–polymer interactions in electrolyte‐gated synaptic transistors. Asymmetric anions induce hydrogen‐bond interactions that suppress ion back‐diffusion and stabilize doping, enabling enhanced nonvolatile synaptic properties.
Donghwa Lee +5 more
wiley +1 more source
Information Encryption and Hiding into an Image By Steganography Methods to Improve Data Security
Nowadays, data security has become very important. A data can be hidden with a steganography technique into text, image, audio and video files. Steganography is used widely data security applications.
Sefa Tunçer
doaj
Self‐Healing and Stretchable Synaptic Transistor
A self‐healing stretchable synaptic transistor (3S‐T) is realized using a p‐PVDF‐HFP‐DBP/PDMS‐MPU‐IU bilayer as gate insulator, where dipole‐dipole interaction enhances polarization to achieve a large memory window. Leveraging its neuronal biomimicry, the synaptic transistor demonstrates electrically compatibility with the biological brain. Furthermore,
Hyongsuk Choo +10 more
wiley +1 more source

