Results 111 to 120 of about 32,602 (220)

Balancing Production and Environmental Goals in Pasture‐Based Dairy Systems: A Longitudinal Case Study of Transition in a High Performing New Zealand Farm

open access: yesNew Zealand Journal of Agricultural Research, Volume 69, Issue 2, April 2026.
Production and environmental outputs of intensive pasture‐based dairy systems must be rebalanced to reduce overall environmental footprint. This analysis documents the tactical management changes that enabled Lincoln University Dairy Farm (LUDF) to transition from high nitrogen (N) inputs (345 kg N fertiliser/ha/year) to a lower N input strategy (167 ...
David F. Chapman
wiley   +1 more source

The Pro‐Office Mindset. Anticorruption Beyond Legal Instruments

open access: yes
Journal of Social Philosophy, EarlyView.
Emanuela Ceva, Patrizia Pedrini
wiley   +1 more source

Using Arts‐Based Methods to Involve People Living in Tower Hamlets With Multiple Long‐Term Conditions in the Development of Artificial Intelligence Tools in Healthcare Research

open access: yesHealth Expectations, Volume 29, Issue 2, April 2026.
ABSTRACT Background Including public contributors in the development of artificial intelligence (AI) systems in healthcare research is growing, however, traditional methods of participation fail to engage people from minoritised groups. This work explores how we can utilise art‐based methods to involve the perspectives of those not previously included ...
Elizabeth Remfry   +7 more
wiley   +1 more source

Collective Neuroplasticity in the Human Division of Labor: Theory, Evidence, and Implications

open access: yesSociology Compass, Volume 20, Issue 4, April 2026.
ABSTRACT The division of labor in human societies have been mainly analyzed by Adam Smith and Émile Durkheim, both from two different perspectives. However, due to the limitations of the state of knowledge and technology in their respective eras, their approach reached the end of its productivity.
Artur Tomas Grygierczyk
wiley   +1 more source

A neural network framework based on ConvNeXt for side-channel hardware Trojan detection

open access: yesETRI Journal
Researchers in the field of hardware security have been dedicated to the study of hardware Trojan detection. Among the various approaches, side-channel detection methods are widely used because of their high detection accuracy and fewer constraints ...
Yuchan Gao   +4 more
doaj   +1 more source

Defense of hidden backdoor technology for Web

open access: yesDianxin kexue, 2020
Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and ...
Liyue CHEN   +4 more
doaj   +2 more sources

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

open access: yesIEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties.
Junjun Huan   +3 more
doaj   +1 more source

Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning

open access: yesCybersecurity
Cyber-physical systems rely on sensors, communication, and computing, all powered by integrated circuits (ICs). These ICs are vulnerable to malicious hardware attacks, with hardware Trojans being one of the stealthiest threats.
Sefatun-Noor Puspa   +5 more
doaj   +1 more source

Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions

open access: yesIEEE Access
Deep neural network (DNN) classifiers are potent instruments that can be used in various security-sensitive applications. Nonetheless, they are vulnerable to certain attacks that impede or distort their learning process.
Orson Mengara   +2 more
doaj   +1 more source

DART: Distribution-Aware Hardware Trojan Detection

open access: yesIEEE Transactions on Information Forensics and Security
Machine Learning (ML) has proven effective in Integrated Circuits (IC) security, particularly in Hardware Trojan (HT) detection. However, a model’s generalization potential depends on its ability to address distribution shifts (DS) in unseen data. Mitigating DS enhances a model’s adaptability to novel variations and threats within the dynamic realm of ...
Luke Chen   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy