Results 61 to 70 of about 44,364 (200)

Breeding and foraging habitat are important in determining foraging ranges of sympatric generalist species

open access: yesIbis, EarlyView.
How far animals travel to gather food for offspring or themselves is a central component of ecology. Among birds, the ‘foraging range’ (straight‐line distance between a central place and a destination) is used to assess potential interactions with anthropogenic stressors such as wind farms.
Chris B. Thaxter   +15 more
wiley   +1 more source

Scalable and Sustainable Deep Learning via Randomized Hashing

open access: yes, 2016
Current deep learning architectures are growing larger in order to learn from complex datasets. These architectures require giant matrix multiplication operations to train millions of parameters.
Chen Wenlin   +8 more
core   +1 more source

The Facilitator Problem: Politicizing Epistemic‐Democratic Assumptions in the People's Republic of China

open access: yesPhilosophy &Public Affairs, EarlyView.
ABSTRACT Within discussions of deliberative democracy, the role of facilitator is ever‐present: they gather participants, introduce expert information, correct for discursive prejudices, and more. Few recognize, however, that facilitators therefore exercise substantive, normative control over the process, thereby constituting a threat to the legitimacy
Emerson R. Bodde
wiley   +1 more source

The Drivers of Science Referenced in US EPA Regulatory Impact Analyses: Open Access, Professional Popularity, and Agency Involvement

open access: yesRegulation &Governance, EarlyView.
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley   +1 more source

Independent Effects of Age, Education, Verbal Working Memory, Motor Speed of Processing, Locality, and Morphosyntactic Category on Verb‐Related Morphosyntactic Production: Evidence From Healthy Aging

open access: yesTopics in Cognitive Science, EarlyView.
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi   +3 more
wiley   +1 more source

Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications

open access: yesAdvanced Optical Materials, Volume 13, Issue 29, October 13, 2025.
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali   +4 more
wiley   +1 more source

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Minimal perfect hash functions in large scale bioinformatics Problem

open access: green, 2016
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset   +3 more
openalex   +3 more sources

Parallel Searching for a First Solution [PDF]

open access: yes, 1993
A parallel algorithm for conducting a search for a first solution to the problem of generating minimal perfect hash functions is presented. A message-based distributed memory computer is assumed as a model for parallel computations.
Bartoszek, Bozena   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy