Results 71 to 80 of about 23,021 (203)

Imaging and controlling plasmonic interference fields at buried interfaces

open access: yesNature Communications, 2016
Visualizing surface plasmon polaritons at buried interfaces has remained elusive. Here, the authors develop a methodology to study the spatiotemporal evolution of buried near-fields within complex heterostructures, enabling the characterization of the ...
Tom T. A. Lummen   +8 more
doaj   +1 more source

FedAnomDetect a Clustered Federated Learning Framework for Robust Anomaly Detection With Enhanced Privacy and Communication Efficiency

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley   +1 more source

Cardiac incoordination induced by left bundle branch block: its relation with left ventricular systolic function in patients with and without cardiomyopathy

open access: yesCardiovascular Ultrasound, 2008
Background Although left bundle branch block (LBBB) alters the electrical activation of the heart, it is unknown how it might change the process of myocardial coordination (MC) and how it may affect the left ventricular (LV) systolic function.
del Furia Francesca   +5 more
doaj   +1 more source

Evaluation of Machine Learning Techniques for Denial‐of‐Service Attack Detection in Digital Information Exchange

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Anomaly detection plays a critical role in mitigating cybersecurity threats, particularly Distributed Denial of Service (DDoS) attacks. This study evaluates the performance of tree‐based and ensemble learning models, including Decision Tree, Random Forest, and XGBoost, for classifying Snort log data, alongside the application of Isolation Forest for ...
Piyapol Suwimol   +3 more
wiley   +1 more source

Metaheuristic Optimization Algorithm for Vulnerability Detection in Web of Things Environment

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
The integration of the Web of Things with cloud computing platforms has significantly improved data sharing, analytics, and automation across smart environments. However, this interconnection also exposes devices and cloud infrastructures to severe security threats, including Trojans, ransomware, worms, and advanced malware.
Romil Rawat   +2 more
wiley   +1 more source

The electronic structure of the high-symmetry perovskite iridate Ba2IrO4

open access: yesNew Journal of Physics, 2014
We report angle-resolved photoemission (ARPES) measurements, density functional and model tight-binding calculations on Ba _2 IrO _4 (Ba-214), an antiferromagnetic ( T _N  = 230 K) insulator.
S Moser   +13 more
doaj   +1 more source

A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]

open access: yes, 2015
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu   +4 more
core  

Efficient but Elusive Rhizobia Fix Nitrogen in the Wild Legumes Bituminaria bituminosa and Coronilla Viminalis

open access: yesJournal of Basic Microbiology, Volume 65, Issue 12, December 2025.
ABSTRACT In ecological restoration of degraded natural habitats, revegetation with wild native plants is a priority. Legumes play a key role in this process through nitrogen (N)‐fixing symbiosis with rhizobia, obtaining N for their growth and improving soil fertility, which benefits other nonleguminous plants in the environment. This study explores the
Ana Monzón‐Ramos   +6 more
wiley   +1 more source

Kablosuz Ağlarda Yeni Bir Anahtar Dağıtım Yöntemi

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
Ağ teknolojilerinin gelişimi ve dijital cihazların artışı multimedya iletimini hızlı ve kolay kılmıştır. Bununla birlikte açık haberleşme kanalları üzerinden yapılan dijital veri iletimi, telif hakkı ihlalleri, dolandırıcılık vb.
Çağatay Ay
doaj  

Ionic Conjugated Microporous Polymers for Cycloaddition of Carbon Dioxide to Epoxides

open access: yesMacromolecular Materials and Engineering
Along the development of ionic porous organic polymers, simple and efficient synthetic methods are actively pursued. Herein, the Debus–Radziszewski reaction is applied to synthesize ionic conjugated microporous polymers (iCMPs) in one step.
Xiang Lin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy