An Evaluation on Anonymity and Known Painters in Byzantine Painting Art
Most of the mosaic, fresco and icon examples of Byzantine painting art are anonymous. Anonymity is closely related to the devotional intentions of the painters during the copying of the cult images. Icons attributed to St.
Gülşah Uslu
doaj +1 more source
Auditory–Tactile Congruence for Synthesis of Adaptive Pain Expressions in RoboPatients
In this work, we explore auditory–tactile congruence for synthesizing adaptive vocal pain expressions in robopatients. Using a robopatient platform that integrates vocal pain sounds with palpation forces, we conducted 7680 trials across 20 participants.
Saitarun Nadipineni +4 more
wiley +1 more source
Dovetail: Stronger Anonymity in Next-Generation Internet Routing [PDF]
Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher
A. Acquisti +5 more
core +3 more sources
Data‐Driven Bulldozer Blade Control for Autonomous Terrain Leveling
A simulation‐driven framework for autonomous bulldozer leveling is presented, combining high‐fidelity terramechanics simulation with a neural‐network‐based reduced‐order model. Gradient‐based optimization enables efficient, low‐level blade control that balances leveling quality and operation time.
Harry Zhang +5 more
wiley +1 more source
Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin +2 more
core +1 more source
Consensus Formation and Change are Enhanced by Neutrality
Neutral agents are shown to enhance both the formation and overturning of consensus in collective decision‐making. A general mathematical model and experiments with locusts and humans reveal that neutrality enables robust consensus via simple interactions and accelerates consensus change by reducing effective population size.
Andrei Sontag +3 more
wiley +1 more source
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Wireless Healthcare Sensor Network (WHSN) is a benchmarking technology deployed to levitate the quality of lives for the patients and doctors. WHSN systems must fit IEEE 802.15.6 standard for specific application criteria, unlike some standard criteria ...
Abdullah M. Almuhaideb +1 more
doaj +1 more source
ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song +12 more
wiley +1 more source
Big experimenter is watching you! Anonymity and prosocial behavior in the laboratory [PDF]
Social preference research has received considerable attention in recent years. Researchers have demonstrated that the presence of people with other-regarding preferences can have important implications in many economic dimensions.
Christian Zehnder +2 more
core +3 more sources
Concurrent Two-Party Key Exchange With Forward Unlinkability in Internet of Drones
By the drone capturing attacks, the adversaries can extract the long-term secret keys stored in the drones. Therefore, it is necessary to consider forward secrecy and forward unlinkability to minimize the damage by the drone capturing attacks.
Jae Yeol Jeong +2 more
doaj +1 more source

