Results 61 to 70 of about 186,232 (264)

Liquid Metal Sensors for Soft Robots

open access: yesAdvanced Robotics Research, EarlyView.
This review thoroughly reviews liquid metal sensors in soft robots. Their unique material properties like high conductivity and good biocompatibility are analyzed. Working principles are classified, and applications in environmental perception, motion detection, and human—robot interaction are introduced.
Qi Zhang   +7 more
wiley   +1 more source

Block CUR: Decomposing Matrices using Groups of Columns

open access: yes, 2018
A common problem in large-scale data analysis is to approximate a matrix using a combination of specifically sampled rows and columns, known as CUR decomposition.
C Boutsidis   +8 more
core   +1 more source

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Allelic expression patterns of imprinted and non-imprinted genes in cancer cell lines from multiple histologies

open access: yesClinical Epigenetics
Background Imprinted genes are epigenetically regulated in normal tissues to follow monoallelic expression according to the parent of origin of each allele. Some of these patterns are dysregulated in cancer.
Julia Krushkal   +3 more
doaj   +1 more source

Enhancing Gait Recognition with Attention-Based Spatial-Temporal Deep Learning: The GaitDeep Framework [PDF]

open access: yesComputer Science Journal of Moldova
Gait, an individual’s unique walking style, serves as an effective biometric tool for surveillance. Unlike fingerprints or iris scans, gait is observable from a distance without the subject’s awareness, making it ideal for security applications.
Sachin Mandlik   +3 more
doaj   +1 more source

Footstep Recognition Using Mel Frequency Cepstral Coefficients and Artificial Neural Network

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Footstep recognition is relatively new biometrics and based on the learning of footsteps signals captured from people walking on the sensing area.
Thasya Nurul Wulandari Siagian   +2 more
doaj   +1 more source

Investigation of Properties of paper made from tensile wood and normal wood in Populus nigra [PDF]

open access: yesتحقیقات علوم چوب و کاغذ ایران, 2015
In this research Tension Wood (TW) and Normal Wood (NW) of Poplar were analyzed for pulp production using Kraft pulping process. After preparing samples, Biometric characteristics of the NW and TW fibers were measured and samples were converted to pulp ...
Jaber Hossein zade   +4 more
doaj   +1 more source

Rib‐Reinforced Ultralight and Ultra‐Strong Shell Lattices

open access: yesAdvanced Science, EarlyView.
This study thoroughly reveals the relation between the curvature and stress direction of triply periodic minimal surface (TPMS) thin shell lattices and proposes a novel rib reinforcement design strategy to incorporate ribs along the line of asymptotes (LOA) and the line of principal curvatures (LOC) to enhance the strength of ultralight TPMS shell ...
Winston Wai Shing Ma   +6 more
wiley   +1 more source

Analysis of Gene Expression Data Using BRB-Array Tools

open access: yesCancer Informatics, 2007
BRB-ArrayTools is an integrated software system for the comprehensive analysis of DNA microarray experiments. It was developed by professional biostatisticians experienced in the design and analysis of DNA microarray studies and incorporates methods ...
Richard Simon   +5 more
doaj   +1 more source

An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics [PDF]

open access: yes, 2017
Biometric systems have to address many requirements, such as large population coverage, demographic diversity, varied deployment environment, as well as practical aspects like performance and spoofing attacks.
Mavroeidis, Vasileios, Vishi, Kamer
core   +2 more sources

Home - About - Disclaimer - Privacy