Results 91 to 100 of about 49,336 (256)

Incorporating contextual factors in agri-environmental research – options for obfuscation to support wider data application

open access: yesIrish Journal of Agricultural and Food Research
Geoprivacy protection is a significant concern when sharing agricultural data with geographical information. Open and transparent access to agricultural data is essential to optimise its use, as well as integration with other data sources, such as ...
P. Nowbakht   +3 more
doaj   +1 more source

Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control

open access: yesIEEE Access, 2019
Emerging spatial crowdsourcing (SC) provides an approach for collecting and analyzing spatiotemporal information from intelligent transportation systems.
Xiang Chu   +3 more
doaj   +1 more source

CrossMatAgent: AI‐Assisted Design of Manufacturable Metamaterial Patterns via Multi‐Agent Generative Framework

open access: yesAdvanced Intelligent Discovery, EarlyView.
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian   +12 more
wiley   +1 more source

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +1 more source

Impact of Biomimetic Pinna Shape Variation on Clutter Echoes: A Machine Learning Approach

open access: yesAdvanced Intelligent Systems, EarlyView.
Bats with dynamic ear structures navigate dense, echo‐rich environments, yet the echoes they receive are highly random. This study shows that machine learning can reliably detect structural signatures in these seemingly chaotic biosonar signals. The results open new directions for biologically inspired sensing, where time‐varying receiver shapes ...
Ibrahim Eshera   +2 more
wiley   +1 more source

Creation of Automatic Protection System for Executable Files under OS Linux

open access: yesБезопасность информационных технологий, 2010
The main goal of this work is the creation of the automatic protection system for executable files under OS Linux. Existing automatic protection systems for executable files and their functional properties are analyzed.
D. M. Timovsky
doaj  

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj   +1 more source

“And in some cases, we're the best option:” A qualitative study of community‐based doula support for black perinatal mental health

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson   +5 more
wiley   +1 more source

Automatic Deobfuscation of VM-protected Programs

open access: yesБезопасность информационных технологий, 2013
This paper is devoted to the technique for automatic deobfuscation of VM-protected programs. It is based on symbolic execution and abstract interpretation and takes into account protection specific.
Evgenyi Ivanovich Goncharov
doaj  

The Diagnosis That Arrived Decades Late: Living Without and Then With Myhre Syndrome

open access: yesAmerican Journal of Medical Genetics Part C: Seminars in Medical Genetics, EarlyView.
ABSTRACT Myhre syndrome (MIM #139210) is a rare multisystem disorder first described in 1981, characterized by short stature, neurodevelopmental delay, joint contractures, and cardiopulmonary complications. Its molecular basis, recurrent pathogenic variants in SMAD4, was not discovered until 2011. This narrative is based on a review of medical records,
Abdallah F. Elias
wiley   +1 more source

Home - About - Disclaimer - Privacy