Results 101 to 110 of about 16,532 (241)

An AI‐Enabled All‐In‐One Visual, Proximity, and Tactile Perception Multimodal Sensor

open access: yesAdvanced Robotics Research, EarlyView.
Targeting integrated multimodal perception of robots, an AI‐enabled all‐in‐one multimodal sensor is proposed. This sensor is capable of perceiving three types of modalities, including vision, proximity, and tactility. By toggling an ultraviolet light and adjusting the camera focus, it switches smoothly between multiple perceptual modalities, enabling ...
Menghao Pu   +7 more
wiley   +1 more source

Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

open access: yesEgyptian Informatics Journal
Cloud computing security and data protection are becoming increasingly critical as its use increases. The research we present demonstrates how undercover sharing techniques and homomorphic encryption can be combined to protect private information in ...
Sijjad Ali   +4 more
doaj   +1 more source

Improving the Robustness of Visual Teach‐and‐Repeat Navigation Using Drift Error Correction and Event‐Based Vision for Low‐Light Environments

open access: yesAdvanced Robotics Research, EarlyView.
Visual teach‐and‐repeat (VTR) navigation allows robots to learn and follow routes without building a full metric map. We show that navigation accuracy for VTR can be improved by integrating a topological map with error‐drift correction based on stereo vision.
Fuhai Ling, Ze Huang, Tony J. Prescott
wiley   +1 more source

ChicGrasp: Imitation‐Learning‐Based Customized Dual‐Jaw Gripper Control for Manipulation of Delicate, Irregular Bio‐Products

open access: yesAdvanced Robotics Research, EarlyView.
Automated poultry processing lines still rely on humans to lift slippery, easily bruised carcasses onto a shackle conveyor. Deformability, anatomical variance, and hygiene rules make conventional suction and scripted motions unreliable. We present ChicGrasp, an end‐to‐end hardware‐software co‐designed imitation learning framework, to offer a ...
Amirreza Davar   +8 more
wiley   +1 more source

Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously generated
Prasanna Ravi   +4 more
doaj   +1 more source

Data‐Driven Bulldozer Blade Control for Autonomous Terrain Leveling

open access: yesAdvanced Robotics Research, EarlyView.
A simulation‐driven framework for autonomous bulldozer leveling is presented, combining high‐fidelity terramechanics simulation with a neural‐network‐based reduced‐order model. Gradient‐based optimization enables efficient, low‐level blade control that balances leveling quality and operation time.
Harry Zhang   +5 more
wiley   +1 more source

Faster amortized bootstrapping using the incomplete NTT for free

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Amortized bootstrapping techniques have been proposed for FHEW/TFHE to efficiently refresh multiple ciphertexts simultaneously within a polynomial modulus.
Thales B. Paiva   +4 more
doaj   +1 more source

Mettl3‐Mediated m6A Modification Represents a Novel Therapeutic Target for FSGS

open access: yesAdvanced Science, EarlyView.
This study explores the roles of Mettl3‐induced N6‐methyladenosine (m6A) modifications in Focal segmental glomerulosclerosis (FSGS). The findings reveal that inhibition of Mettl3 results in podocyte injury by modulating the TJP1CDC42 pathway. Moreover, Administration of N6‐methyladenosine attenuates the FSGS phenotype in WT mice induced by Adriamycin ...
Fubin Zhu   +14 more
wiley   +1 more source

Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Compared to elliptic curve cryptography, a primary drawback of latticebased schemes is the larger size of their public keys and ciphertexts. A common procedure for compressing these objects consists essentially of dropping some of their least ...
Thales B. Paiva   +5 more
doaj   +1 more source

Allosteric Modulation of Pathological Ataxin‐3 Aggregation: A Path to Spinocerebellar Ataxia Type‐3 Therapies

open access: yesAdvanced Science, EarlyView.
This study uncovers a new allosteric site in the Josephin domain of ataxin‐3 targeted by the molecular tweezer CLR01, which modulates protein aggregation, improves synaptic function in neuronal cells, and delays motor dysfunction in animal models.
Alexandra Silva   +28 more
wiley   +1 more source

Home - About - Disclaimer - Privacy