Results 61 to 70 of about 44,364 (200)
How far animals travel to gather food for offspring or themselves is a central component of ecology. Among birds, the ‘foraging range’ (straight‐line distance between a central place and a destination) is used to assess potential interactions with anthropogenic stressors such as wind farms.
Chris B. Thaxter +15 more
wiley +1 more source
Scalable and Sustainable Deep Learning via Randomized Hashing
Current deep learning architectures are growing larger in order to learn from complex datasets. These architectures require giant matrix multiplication operations to train millions of parameters.
Chen Wenlin +8 more
core +1 more source
ABSTRACT Within discussions of deliberative democracy, the role of facilitator is ever‐present: they gather participants, introduce expert information, correct for discursive prejudices, and more. Few recognize, however, that facilitators therefore exercise substantive, normative control over the process, thereby constituting a threat to the legitimacy
Emerson R. Bodde
wiley +1 more source
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi +3 more
wiley +1 more source
Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali +4 more
wiley +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
Minimal perfect hash functions in large scale bioinformatics Problem
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset +3 more
openalex +3 more sources
Parallel Searching for a First Solution [PDF]
A parallel algorithm for conducting a search for a first solution to the problem of generating minimal perfect hash functions is presented. A message-based distributed memory computer is assumed as a model for parallel computations.
Bartoszek, Bozena +2 more
core +1 more source

