Results 131 to 140 of about 522,468 (334)
Global and Secured UAV Authentication System based on Hardware-Security
Dominic Pirker +3 more
openalex +1 more source
A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory [PDF]
Bohan Lin +5 more
openalex +1 more source
Automated poultry processing lines still rely on humans to lift slippery, easily bruised carcasses onto a shackle conveyor. Deformability, anatomical variance, and hygiene rules make conventional suction and scripted motions unreliable. We present ChicGrasp, an end‐to‐end hardware‐software co‐designed imitation learning framework, to offer a ...
Amirreza Davar +8 more
wiley +1 more source
Objectives. The development of computer technology and information systems requires the consideration of issues of their security, various methods for detecting hardware vulnerabilities of digital device components, as well as protection against ...
E. F. Pevtsov +3 more
doaj +1 more source
Assurance Oriented Hardware Decomposition: A Deterministic Approach to Security Assurance [PDF]
Shao-Fang Wen, Arvind Sharma
openalex +1 more source
Compliant Pneumatic Feet with Real‐Time Stiffness Adaptation for Humanoid Locomotion
A compliant pneumatic foot with real‐time variable stiffness enables humanoid robots to adapt to changing terrains. Using onboard vision and pressure control, the foot modulates stiffness within each gait cycle, reducing impact forces and improving balance. The design, cast in soft silicone with embedded air chambers and Kevlar wrapping, offers durable,
Irene Frizza +3 more
wiley +1 more source
Modular, Textile‐Based Soft Robotic Grippers for Agricultural Produce Handling
This article introduces textile‐based pneumatic grippers that transform simple textiles into robust bending actuators. Detailed experiments uncover how cut geometry and fabric selection shape performance. Successful handling of fragile agricultural items showcases the potential of textile robotics for safe, scalable automation in food processing and ...
Zeyu Hou +4 more
wiley +1 more source
Basic Approaches to Testing of Multifunctional Hardware Software Information Security Tools
This paper aims of developing the technique of complex testing of multifunctional hardware-software information security tools based on hardware-software unites of trusted boot which enables testing of functional security while providing for the desired ...
E. A. Belyaeva
doaj
Survey of research on confidential computing
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng +5 more
doaj +1 more source
Safety & Security monitoring convergence at the dawn of Open Hardware
Sylvain Girbal +3 more
openalex +1 more source

