Advancing Rehabilitation Medicine with the Metaverse: Opportunities and Challenges. [PDF]
Calabrò RS, Morone G.
europepmc +1 more source
Deep Q‐Network‐Based Hierarchical Path Planning of a Biped Wall‐Climbing Robot for Window Cleaning
This article presents a biped wall‐cleaning climbing robotic system for the maintenance of multi‐isolated areas on exoskeleton‐structured windows (ESWs). A full coverage cleaning approach is proposed by integrating a deep Q‐network‐based method with the robotic system to address the complete coverage cleaning path planning problem.
Weijian Zhang+3 more
wiley +1 more source
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats. [PDF]
Arif T, Jo B, Park JH.
europepmc +1 more source
Compliant Robotics in Space: A Prospective Review of Soft and Deformable Systems for Space Missions
Compliant robots are increasingly becoming integral to space exploration due to their adaptability, flexibility, and lightweight design. This article reviews categories such as soft, reconfigurable, and hyper‐redundant robots and their evolving role in enhancing space missions.
Hamed Rahimi Nohooji, Holger Voos
wiley +1 more source
Significance and classification of AI-driven techniques in telecommunication sectors based on interval-valued bipolar fuzzy soft aggregation operators. [PDF]
Ahmmad J, Khan MA, Aldayel I, Mahmood T.
europepmc +1 more source
Information security education: a thematic trend analysis. [PDF]
Rodríguez-Correa PA+6 more
europepmc +1 more source
A Security Posture Assessment of Industrial Control Systems Based on Evidential Reasoning and Belief Rule Base. [PDF]
Song H+5 more
europepmc +1 more source
Layered Security Guidance for Data Asset Management in Additive Manufacturing. [PDF]
Milaat FA, Lubell J.
europepmc +1 more source
GeNIS: A modular dataset for network intrusion detection and classification. [PDF]
Silva M+5 more
europepmc +1 more source
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. [PDF]
Huang Y, Teng T, Li Y, Zhang M.
europepmc +1 more source