Results 81 to 90 of about 32,756 (234)
Albedos and diameters of three Mars Trojan asteroids
We observed the Mars Trojan asteroids (5261) Eureka and (101429) 1998 VF31 and the candidate Mars Trojan 2001 FR127 at 11.2 and 18.1 microns using Michelle on the Gemini North telescope. We derive diameters of 1.28, 0.78, and 0.14. The albedos for Eureka
Andrew S. Rivkin +28 more
core +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj +1 more source
The 2013 Planetary Science Decadal Survey identified a detailed investigation of the Trojan asteroids occupying Jupiter's L4 and L5 Lagrange points as a priority for future NASA missions.
Balcerski, Jeffrey +18 more
core +1 more source
Liquid jet capabilities for ultrafast chemistry at the SwissFEL Alvra instrument
The technical aspects of the Alvra endstation are outlined and its scientific capabilities are demonstrated with commissioning results obtained during the early years of SwissFEL's operation.The Alvra experimental station at the Swiss X‐ray free‐electron laser, SwissFEL, investigates ultrafast dynamics in chemical and biological systems using X‐ray ...
Claudio Cirelli +9 more
wiley +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
CHINESE UNIVERSITIES AS URBAN DEVELOPERS: The Tale of Two Innovation Complexes in Nanjing, China
Abstract Chinese universities are important but undertheorized players in the production of urban built environments. Most work focuses on purpose‐built university towns, neglecting the redevelopment of underutilized downtown campuses. Therefore, this article considers how two publicly funded universities in Nanjing attempted to establish ‘innovation ...
Hao Chen, Yunpeng Zhang
wiley +1 more source
Hardware Trojan Detection Using Controlled Circuit Aging
This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC.
Virinchi Roy Surabhi +6 more
doaj +1 more source
Strict patterns of co‐divergence have rarely been documented other than among organisms and their symbionts. In this paper, using a molecular approach, we inferr the population‐level phylogenies of a Mediterranean ant species Pheidole pallidula and its nest parasite, the obligate myrmecophilous beetle Paussus favieri. We then investigate the role of co‐
Davide Bergamaschi +2 more
wiley +1 more source
Infection control in the brain and the eye
Abstract The Central Nervous System (CNS), comprising the brain and the eye, is considered to have a ‘privileged’ mechanism for dealing with immunological challenge (immune privilege, IP). CNS IP has been revealed through experiments using foreign protein antigens and cell and tissue alloantigens (grafts), but evidence for a role for IP in modulating ...
John V. Forrester +2 more
wiley +1 more source

