Results 91 to 100 of about 34,947 (290)
Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan +4 more
core +1 more source
Abstract This study examines how European food companies can operationally leverage the value created by strategic alliances into commercially viable products. More importantly, it emphasizes that the effects of alliance portfolio diversity (APD) on radical innovation performance can be achieved not only directly, but also via moderating roles, that is,
María Ancín +2 more
wiley +1 more source
Are all meats substitutes? A basket‐and‐expenditure‐based approach
Abstract This study examines the relationship among animal‐based meat and plant‐based meat alternatives (PBMAs) using a basket‐and‐expenditure‐based choice experiment. In particular, we examine whether animal‐based meat products are substitutes or complements with PBMAs.
Clinton L. Neill, Logan L. Britton
wiley +1 more source
Intelligent Theranostic Systems Enabled by Aggregation‐Induced Emission in Precision Medicine
Aggregation‐induced emission (AIE) luminogens are driving a new generation of intelligent theranostic systems that integrate high‐fidelity imaging and multifunctional therapy. This review highlights how AIEgens, through restriction of intramolecular motion (RIM), enable deep‐tissue NIR‐II imaging, ultrasensitive biosensing, CRISPR‐assisted gene ...
Qinqin Huang +7 more
wiley +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Hierarchical Superposition Framework Reveals the Complex Effects of Natural Medicine Formulas
A novel hierarchical superposition pharmacological model incorporates the principle of hierarchical structures from physics to simulate the spatiotemporal dynamics of drug combinations, to elucidate the universal law underlying drug combination effects. By modeling cross‐level causal transmission and attenuation, it advances beyond traditional additive
Weifeng Liang +3 more
wiley +1 more source
This review outlines how recurrent neural networks model multisensory integration by capturing temporal and probabilistic features of sensory input. Key developments, challenges, and future directions are summarized, providing insights into biologically inspired AI. Multisensory integration (MSI) is a core brain function underlying perception, learning,
Ehsan Bolhasani +2 more
wiley +1 more source
In this day’s world, more and more focused on data protection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryptographic hash function.
Tautvydas Brukštus
doaj +1 more source
A low‐cost, Lego‐like magneto‐connected part library is proposed, capable of rapidly assembling, disassembling, and reassembling compact, centimeter‐scale parallel robots with various motion types, balancing structural rigidity and reconfiguration agility.
Yunong Li +5 more
wiley +1 more source
This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.
A. Kato, M. Kanda, S. Kanno
core

