Results 101 to 110 of about 50,028 (274)
Deciphering Intricacies in Directional CO2 Conversion From Electrolysis to CO2 Batteries
This review will delve into the inherent connections and distinctions of CO2‐directed conversion in ECO2RR and CO2 batteries, in terms of product types, catalyst selection, catalytic mechanisms, and electrochemical performances, while proposing a benchmarking framework for the evaluation of CO2 batteries and innovative CO2 battery configurations for ...
Changfan Xu +5 more
wiley +1 more source
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi +2 more
wiley +1 more source
Obfuscation of combination circuits of digital devices from unauthorized access
The problems of designing modern VLSI and SoC are analyzed. The most difficult problems of design are problems of verification of projects at different stages of design.
L. A. Zolotorevich
doaj
The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley +1 more source
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian +12 more
wiley +1 more source
Explaining the Origin of Negative Poisson's Ratio in Amorphous Networks With Machine Learning
This review summarizes how machine learning (ML) breaks the “vicious cycle” in designing auxetic amorphous networks. By transitioning from traditional “black‐box” optimization to an interpretable “AI‐Physics” closed‐loop paradigm, ML is shown to not only discover highly optimized structures—such as all‐convex polygon networks—but also unveil hidden ...
Shengyu Lu, Xiangying Shen
wiley +1 more source
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee +7 more
wiley +1 more source
Identifying obfuscated code through graph-based semantic analysis of binary code
Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection.
Roxane Cohen +3 more
doaj +1 more source

