Results 61 to 70 of about 113,027 (251)

VO2 Oscillator Circuits Optimized for Ultrafast, 100 MHz‐Range Operation

open access: yesAdvanced Electronic Materials, Volume 12, Issue 1, 7 January 2026.
The present study demonstrates ultrasmall (≈30 nm) VO2 Mott memristor‐based oscillators which enter the >100 MHz frequency range via device scaling and optimization of the circuit layout for high frequency operation. Time‐resolved investigation of switching dynamics along with circuit‐level and physics‐based electrothermal simulations identify physical
Zsigmond Pollner   +11 more
wiley   +1 more source

Sustainability Paradoxes in Supply Chains: Analyzing the Effects of Public and Private Regulations

open access: yesBusiness Strategy and the Environment, Volume 35, Issue 1, Page 926-944, January 2026.
ABSTRACT Implementing public and private sustainability regulations in supply chains (SCs) often generates tensions between actors, goals, and processes. This study applies paradox theory to identify key sustainability‐related tensions and management strategies, and to explore their implications for sustainable SC management (SSCM).
Lena Petri, Stefan Seuring
wiley   +1 more source

SPHINX Embedded SIEM v1

open access: yes, 2020
This document reports the development status for the SPHINX System Information and Event Management (SIEM) component. Moreover, it presents the design, architecture and implementation of the SIEM component and its subcomponents, by providing technical details and explaining the level of interaction performed by the subcomponents within the SIEM system ...
openaire   +1 more source

Profile for Aquatic Resources Management: Tboung Kla, Koh Chruem and Ou Chralang villages, Ou Mreah commune, Siem Bouk district, Stung Treng province, Cambodia [PDF]

open access: yes
This publication is part of a collection of three profiles covering nine aquatic resources-dependent villages in the provinces of Stung Treng, Takeo and Siem Reap.
Ahmed, M.   +5 more
core  

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

Testing the Assumptions Behind the Use of Importance Sampling [PDF]

open access: yes
Importance sampling is used in many aspects of modern econometrics to approximate unsolvable integrals. Its reliable use requires the sampler to possess a variance, for this guarantees a square root speed of convergence and asymptotic normality of the ...
Neil Shephard, Siem Jan Koopman
core  

The SiRi Particle-Telescope System [PDF]

open access: yes, 2011
A silicon particle-telescope system for light-ion nuclear reactions is described. In particular, the system is designed to be optimized for level density and gamma-ray strength function measurements with the so-called Oslo method.
Bürger, A.   +3 more
core   +2 more sources

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Principles of data collection for building a secure enterprise infrastructure based on SIEM systems

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj   +1 more source

An analysis of poverty and aquatic resources use - focusing especially on the livelihoods of the poor - in Cambodia [PDF]

open access: yes, 2000
The main objectives of this report, which is based on the current literature and key informant interviews, is to assess and analyse the nature and distribution of poverty and aquatic resources use, focusing especially on the livelihoods of the poor.

core  

Home - About - Disclaimer - Privacy