Results 91 to 100 of about 49,336 (256)
Geoprivacy protection is a significant concern when sharing agricultural data with geographical information. Open and transparent access to agricultural data is essential to optimise its use, as well as integration with other data sources, such as ...
P. Nowbakht +3 more
doaj +1 more source
Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control
Emerging spatial crowdsourcing (SC) provides an approach for collecting and analyzing spatiotemporal information from intelligent transportation systems.
Xiang Chu +3 more
doaj +1 more source
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian +12 more
wiley +1 more source
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +1 more source
Impact of Biomimetic Pinna Shape Variation on Clutter Echoes: A Machine Learning Approach
Bats with dynamic ear structures navigate dense, echo‐rich environments, yet the echoes they receive are highly random. This study shows that machine learning can reliably detect structural signatures in these seemingly chaotic biosonar signals. The results open new directions for biologically inspired sensing, where time‐varying receiver shapes ...
Ibrahim Eshera +2 more
wiley +1 more source
Creation of Automatic Protection System for Executable Files under OS Linux
The main goal of this work is the creation of the automatic protection system for executable files under OS Linux. Existing automatic protection systems for executable files and their functional properties are analyzed.
D. M. Timovsky
doaj
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson +5 more
wiley +1 more source
Automatic Deobfuscation of VM-protected Programs
This paper is devoted to the technique for automatic deobfuscation of VM-protected programs. It is based on symbolic execution and abstract interpretation and takes into account protection specific.
Evgenyi Ivanovich Goncharov
doaj
The Diagnosis That Arrived Decades Late: Living Without and Then With Myhre Syndrome
ABSTRACT Myhre syndrome (MIM #139210) is a rare multisystem disorder first described in 1981, characterized by short stature, neurodevelopmental delay, joint contractures, and cardiopulmonary complications. Its molecular basis, recurrent pathogenic variants in SMAD4, was not discovered until 2011. This narrative is based on a review of medical records,
Abdallah F. Elias
wiley +1 more source

