Results 141 to 150 of about 850,549 (316)
Nghiên cứu được thực hiện nhằm mục đích khảo sát sự ảnh hưởng của thời gian sấy đến hoạt tính chống oxy hóa của bột tỏi, gừng và sả và sự biến đổi chất lượng của sản phẩm chả cá thát lát còm khi phối trộn các loại bột này và bảo quản lạnh trong 20 ngày ...
Lê Thị Minh Thủy +3 more
doaj +1 more source
Soft robotic arms are promising for gentle grasping but often rely on bulky actuation systems. This work presents a computational design framework that optimizes tendon number and routing to achieve target grasps with fewer actuators. Validated on an octopus‐inspired underwater arm, the approach enables efficient, underactuated soft manipulators for ...
Michele Martini +6 more
wiley +1 more source
Solving monotone inclusions involving parallel sums of linearly composed maximally monotone operators [PDF]
The aim of this article is to present two different primal-dual methods for solving structured monotone inclusions involving parallel sums of compositions of maximally monotone operators with linear bounded operators.
Bot, Radu Ioan, Hendrich, Christopher
core
GraphNeuralCloth: A Graph‐Neural‐Network‐Based Framework for Non‐Skinning Cloth Simulation
This study presents a cloth motion capture system and a point‐cloud‐to‐mesh processing method to support the prediction of real‐world fabric deformation. GraphNeuralCloth, a graph neural‐network (GNN)‐based framework is also proposed to estimate the cloth morphology change in real time.
Yingqi Li +9 more
wiley +1 more source
Abstract The middle Permian represents a critical interval in therapsid evolution, when gorgonopsians emerged as some of the first specialized apex predators within terrestrial ecosystems. Despite their significance, the early diversification of Gorgonopsia in Gondwana remains poorly understood due to scarcity and fragmentary material.
Zanildo Macungo +5 more
wiley +1 more source
Investigation on the botnets activities
Botnets have become the first-choice attack platform for the network attackers to launch distributed denial of service attacks,steal sensitive information and send spam.They have raised serious threats to normal operation of the Internet and the benefits
HAN Xin-hui1 +4 more
doaj
Shari’ah-compliant Financing Mechanisms for Belt and Road Initiative: Mitigating Debt Trap Risks
Purpose - The purpose of this study was to examine how Shari'ah-compliant finance can be a solution in financing BRI projects and mitigating debt risk. Method - The study uses a systematic literature review.
Ramadhani Mashaka Shabani
doaj +1 more source
SpartanAnatomy.org: Evaluating a new interactive neuroradiology tool for early medical education
Abstract Teaching neuroanatomy through the lens of magnetic resonance imaging (MRI) offers medical students a strong foundation for success. However, many existing MRI learning resources lack interactivity and user‐friendliness, require payment, or include an overwhelming number of labeled structures.
Halie Kerver +3 more
wiley +1 more source
ABSTRACT Although motor‐skill differences in autistic individuals are well established, there is diverging evidence regarding what happens to motor skills in autistic children as they become adolescents. Using both cross‐sectional and longitudinal data, we examined fine and gross motor skills and grip strength of 187 autistic participants and 136 non ...
Allison R. Block +4 more
wiley +1 more source
Software Robots and Information Security
This article is about special methods of information security. These methods are a part of the tools of ensuring the information security. In this paper the problem of threats and protection against software robots discussed.
Sergey Dmitrievich Kulik +1 more
doaj

