Results 111 to 120 of about 1,838 (257)
This study presents a multitask strategy for plastic cleanup with autonomous surface vehicles, combining exploration and cleaning phases. A two‐headed Deep Q‐Network shared by all agents is traineded via multiobjective reinforcement learning, producing a Pareto front of trade‐offs.
Dame Seck +4 more
wiley +1 more source
Stochastic Photoresponse‐Driven Perovskite TRNGs for Secure Encryption Systems
True random numbers are essential for ensuring information security and supporting simulations across various industries. With the exponential growth of data driven by advancements in artificial intelligence, robust encryption for communications has ...
Dante Ahn +12 more
doaj +1 more source
Impact of Biomimetic Pinna Shape Variation on Clutter Echoes: A Machine Learning Approach
Bats with dynamic ear structures navigate dense, echo‐rich environments, yet the echoes they receive are highly random. This study shows that machine learning can reliably detect structural signatures in these seemingly chaotic biosonar signals. The results open new directions for biologically inspired sensing, where time‐varying receiver shapes ...
Ibrahim Eshera +2 more
wiley +1 more source
A hierarchical multimodal framework coupling a large language model for task decomposition and semantic mapping with a fine‐tuned vision‐language model for semantic perception, enhanced by GridMask, is presented. An aerial‐ground robot team exploits the semantic map for global and local planning.
Haokun Liu +6 more
wiley +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
Robust anti‐counterfeiting techniques aim for easy identification while remaining difficult to forge, especially for high‐value items such as currency and passports.
Yifan Gao +7 more
doaj +1 more source
Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain [PDF]
Hukum Singh
openalex +1 more source
A surrogate‐model‐based framework is proposed for combining high‐fidelity finite element method and efficient physics simulations to enable fast, accurate soft robot simulation for reinforcement learning, validated through sim‐to‐real experiments. Soft robotics holds immense promise for applications requiring adaptability and compliant interactions ...
Taehwa Hong +3 more
wiley +1 more source
Review of Memristors for In‐Memory Computing and Spiking Neural Networks
Memristors uniquely enable energy‐efficient, brain‐inspired computing by acting as both memory and synaptic elements. This review highlights their physical mechanisms, integration in crossbar arrays, and role in spiking neural networks. Key challenges, including variability, relaxation, and stochastic switching, are discussed, alongside emerging ...
Mostafa Shooshtari +2 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source

