Results 131 to 140 of about 3,043,921 (314)
Actuation Strategies for Underwater Jet‐Propelled Soft Robots
ABSTRACT This review article examines jet‐propulsion mechanisms in underwater soft robotic systems, focusing exclusively on physically fabricated and experimentally validated robots. Covering research published from 2013 to 2025, this study classifies and evaluates jet‐propulsion robots based on their actuation mechanisms.
Angel Kitone +3 more
wiley +1 more source
Enabling Asynchronous Machine-Type D2D Communication Using Multiple Waveforms in 5G
Conor Sexton +5 more
semanticscholar +1 more source
Brain‐Inspired Neuromorphic Device for Artificial Intelligent Robots Applications
Brain‐inspired neuromorphic devices mimic biological systems to provide an efficient hardware foundation for embodied intelligent robotics. This review explores the material systems and corresponding computing architectures of neuromorphic devices that support low‐power perception, adaptive learning, and real‐time decision‐making.
Jiachen Han +3 more
wiley +1 more source
Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz +2 more
wiley +1 more source
The paper presents methodology for mathematical modeling of power system (its part) when jointly operated with wind power plants (stations) that contain asynchronous doubly-fed machines used as generators.
R. I. Mustafayev, L. G. Hasanova
doaj
Formal Approach to Safety‐Driven Dynamic Procedure Modeling
ABSTRACT Ensuring the safety of unmanned aerial systems (UAS) is a growing concern as the number of UAS grows increasingly fast. Regulatory bodies are in the process of tackling this problem by issuing standards and recommendations to be met by UAS designers.
Jean‐Charles Chaudemar +3 more
wiley +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Portable Radar for Noncontact Heart Rate Monitoring and Estrus Detection in Dairy Cows
This study introduces a portable radar system for real‐time monitoring of respiratory and heart rates in dairy cows. It uses millimeter‐wave Frequency Modulated Continuous Wave (FMCW) radar to perform noncontact physiological sensing, reducing behavioral disturbance. The radar system's design prioritizes portability, cost‐effectiveness, and robustness,
Yingxiu Li +7 more
wiley +1 more source
Proctoring in a Second Language: Exploring Fairness and Justice in Remote English Language Testing
Abstract Remote proctoring is increasingly common in English language testing (Isbell & Kremmel, 2020), yet it often requires communication in the target language, unlike in‐person centers that may offer support in test‐takers' first language. Although prior studies have noted communication challenges in remote testing environments (Green & Lung, 2021;
Jieun Kim
wiley +1 more source
Abstract This teaching article explores how microlearning can support TESOL educators in developing the pedagogical and emotional capacities needed to use generative artificial intelligence (GenAI) tools to design and evaluate digital multimodal compositions (DMC).
Lucas Kohnke, Di Zou
wiley +1 more source

