Results 11 to 20 of about 101,057 (87)

Probabilistic Dynamics for Integrated Analysis of Accident Sequences considering Uncertain Events

open access: yesScience and Technology of Nuclear Installations, 2015
The analytical/deterministic modelling and simulation/probabilistic methods are used separately as a rule in order to analyse the physical processes and random or uncertain events. However, in the currently used probabilistic safety assessment this is an
Robertas Alzbutas
doaj   +1 more source

Spaces, Times, Architectures. the Elements of the Constructive Phenomenon

open access: yesTechne, 2020
Architecture represents a primary hourglass marking the passage of time. It elevates the city to a preferred theatre for such representation, «[…] human time will never conform to the implacable uniformity or fixed divisions of clock time»1.
Emilio Faroldi
doaj   +1 more source

SIGNAL SHAPE RECOVER BY BISPECTRUM IN NOISE ENVIRONMENT

open access: yesРадіоелектронні і комп'ютерні системи, 2019
In a number of practical applications of digital signal processing, the process under study may include correlated spectral components or phase coupling.
Виктория Владимировна Науменко   +3 more
doaj   +1 more source

Comprehensive Analysis on Complementary FET

open access: yesIEEE Access
Complementary Field Effect Transistors (CFETs) have surfaced as a hopeful path to the continued logic area scaling in CMOS technology. This comprehensive review paper explores recent advancements and integration strategies in CFET technology, spanning ...
Ayush Bhardwaj   +7 more
doaj   +1 more source

Cattaneo-Christov heat and mass fluxes model of Casson fluid employing non-Fourier double diffusion theories with ion slip and Hall effects

open access: yesAin Shams Engineering Journal
It is vitally important to comprehend non-Newtonian fluids flow behaviour from an industrial perspective. Non-Newtonian fluids are needed for a number of industrial and technical processes, including the production of paper, photographic films, and ...
Esraa N. Thabet   +3 more
doaj   +1 more source

Resilience evaluation of memristor based PUF against machine learning attacks

open access: yesScientific Reports
Physical unclonable functions (PUFs) have emerged as a favorable hardware security primitive, they exploit the process variations to provide unique signatures or secret keys amidst other critical cryptographic applications.
Hebatallah M. Ibrahim   +2 more
doaj   +1 more source

Optimizing network bandwidth slicing identification: NADAM-enhanced CNN and VAE data preprocessing for enhanced interpretability.

open access: yesPLoS ONE
Communication networks of the future will rely heavily on network slicing (NS), a technology that enables the creation of distinct virtual networks within a shared physical infrastructure.
Md Fahim Ul Islam   +4 more
doaj   +1 more source

Quantum-enhanced reconfigurable in-memory stochastic computing. [PDF]

open access: yesLight Sci Appl
Yang HZ   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy