Results 91 to 100 of about 676,463 (285)
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
Privacy-preserving photo sharing framework cross different social network
With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this ...
Fenghua LI +4 more
doaj +2 more sources
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu +8 more
wiley +1 more source
Shaping Carbon Nitrides for Advanced Macrostructures
This review examines how carbon nitride can be shaped through a range of printing and interfacial assembly methods. By bringing together additive manufacturing and liquid–liquid structuring concepts, carbon nitride is moving beyond its traditional powder‐based photocatalyst form toward digitally designed robust macroscale architectures with high design
Simona Baluchová, Baris Kumru
wiley +1 more source
A soft robotic simulator is developed to replicate the digital removal of feces (DRF), a sensitive yet essential nursing procedure. Integrating soft actuators, sensors, and a realistic rectal model, the simulator balances functional fidelity with perceptual realism. Engineering evaluations and nurse feedback confirm its potential to enhance training in
Shoko Miyagawa +10 more
wiley +1 more source
Research on privacy protection mechanism and technology of educational big data
With the deepening application of big data technology in the field of education,the potential risks such as personal privacy security that may be brought by the collection,analysis and sharing of educational data can not be ignored.How to ensure the ...
Jieyu YUE +3 more
doaj
RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang +3 more
doaj +1 more source
Hard‐Magnetic Soft Millirobots in Underactuated Systems
This review provides a comprehensive overview of hard‐magnetic soft millirobots in underactuated systems. It examines key advances in structural design, physics‐informed modeling, and control strategies, while highlighting the interplay among these domains.
Qiong Wang +4 more
wiley +1 more source
The EU-US Passenger Name Record (PNR) agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks.
Maria Tzanou
doaj +1 more source

