Results 111 to 120 of about 522,408 (289)

Asymmetry in Skipping Enhances Viability Against Control Input Noise

open access: yesAdvanced Robotics Research, EarlyView.
Quadruped animals use asymmetric galloping gaits at high speeds, yet the functional role of this asymmetry remains unclear. This study shows that left–right asymmetry in touchdown angles enhances robustness to control noise. Using a simple two‐legged locomotion model and viability theory, it demonstrates that asymmetric skipping substantially enlarges ...
Yuichi Ambe, Alvin So, Shinya Aoi
wiley   +1 more source

The Management and Security Expert (MASE) [PDF]

open access: yes
The Management and Security Expert (MASE) is a distributed expert system that monitors the operating systems and applications of a network. It is capable of gleaning the information provided by the different operating systems in order to optimize ...
Barr, Stanley J.   +5 more
core   +1 more source

A Self‐Healing Permanent Magnet Putty for Soft Robot Skins With Force Sensing and Functional Recovery

open access: yesAdvanced Robotics Research, EarlyView.
Permanent magnet putty (PMP) integrates high‐coercivity NdFeB particles with a dynamic polyborosiloxane–Ecoflex matrix, achieving rapid self‐healing (90% mechanical recovery in 10 s) and magnetic recovery within 20 min. With twice the sensitivity of commercial putties, PMP enables precise 5–30 N force detection and discrimination between pressing and ...
Ruotong Zhao   +5 more
wiley   +1 more source

ChicGrasp: Imitation‐Learning‐Based Customized Dual‐Jaw Gripper Control for Manipulation of Delicate, Irregular Bio‐Products

open access: yesAdvanced Robotics Research, EarlyView.
Automated poultry processing lines still rely on humans to lift slippery, easily bruised carcasses onto a shackle conveyor. Deformability, anatomical variance, and hygiene rules make conventional suction and scripted motions unreliable. We present ChicGrasp, an end‐to‐end hardware‐software co‐designed imitation learning framework, to offer a ...
Amirreza Davar   +8 more
wiley   +1 more source

Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Security verification of masked software implementations of cryptographic algorithms must account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to provide a formal separation between hardware and software verification ...
Johannes Haring   +2 more
doaj   +1 more source

Compliant Pneumatic Feet with Real‐Time Stiffness Adaptation for Humanoid Locomotion

open access: yesAdvanced Robotics Research, EarlyView.
A compliant pneumatic foot with real‐time variable stiffness enables humanoid robots to adapt to changing terrains. Using onboard vision and pressure control, the foot modulates stiffness within each gait cycle, reducing impact forces and improving balance. The design, cast in soft silicone with embedded air chambers and Kevlar wrapping, offers durable,
Irene Frizza   +3 more
wiley   +1 more source

A Multidirectional Textile Interface for Remote Control Using Dynamic Area‐Based Capacitance Modulation

open access: yesAdvanced Robotics Research, EarlyView.
Here, we present a textile, wearable capacitive interface enabling multidirectional remote control by dynamically modulating electrode overlap and spacing via a freely gliding upper electrode. A forearm‐mounted prototype drives robotic and media tasks with 12–15 ms latency, maintains < 0.8% drift after 500 cycles, and remains stably functional at 90 ...
Cagatay Gumus   +8 more
wiley   +1 more source

Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs

open access: yesCryptography
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables
Jaya Dofe   +3 more
doaj   +1 more source

Random-telegraph-noise-enabled true random number generator for hardware security. [PDF]

open access: yesSci Rep, 2020
Brown J   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy