Results 61 to 70 of about 390,993 (284)
Wereportonanewmultiscalemethodapproachforthestudyofsystemswith wide separation of short-range forces acting on short time scales and long-range forces acting on much slower scales. We consider the case of the Poisson-Boltzmann equation that describes the
Jiang, Wei, Lapenta, Giovanni
core +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor
Aiming at the problem that the embedded capacity and security of the single-carrier information hiding algorithm can not be further improved because of the number of carriers, the carrier pre-processing and the embedding of secret information are ...
Shuai Ren +4 more
doaj +1 more source
The transform domain provides a useful tool in the field of confidential data hiding and protection. In order to protect and transmit patients’ information and competence, this study develops an amplitude quantization system in a transform domain by ...
Shuo-Tsung Chen +6 more
doaj +1 more source
Exploring the photocatalytic reverse water–gas shift (RWGS) reaction on doped SrTiO3 nanoparticle films, reveals that normalizing catalytic rates by the catalyst's specific surface area (SSA) disentangled surface area effects from the catalyst's intrinsic material properties.
Dikshita Bhattacharyya +6 more
wiley +1 more source
Selective Redundancy Removal: A Framework for Data Hiding
Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs.
Ugo Fiore
doaj +1 more source
An overview on audio steganography techniques [PDF]
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah +2 more
core
Biomimetic Iridescent Skin: Robust Prototissues Spontaneously Assembled from Photonic Protocells
Uniform nanoparticles are induced to form arrays (photonic crystals) in the cores of biopolymer capsules, endowing these ‘protocells’ with structural color. These protocells are then assembled into large self‐standing objects, i.e., prototissues, with robust mechanical properties as well as iridescent optical properties.
Medha Rath +6 more
wiley +1 more source
Information Hiding Based on Chan-Vese Algorithm [PDF]
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is ...
Samia Sh. Lazar, Nadia M. Mohammed
doaj +1 more source
Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel.
Brun, Todd A., Shaw, Bilal A.
core +1 more source

