Results 161 to 170 of about 2,442,732 (352)
Deep Q‐Network‐Based Hierarchical Path Planning of a Biped Wall‐Climbing Robot for Window Cleaning
This article presents a biped wall‐cleaning climbing robotic system for the maintenance of multi‐isolated areas on exoskeleton‐structured windows (ESWs). A full coverage cleaning approach is proposed by integrating a deep Q‐network‐based method with the robotic system to address the complete coverage cleaning path planning problem.
Weijian Zhang+3 more
wiley +1 more source
Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware
Shayan Taheri, J.S. Yuan
openalex +2 more sources
Compliant Robotics in Space: A Prospective Review of Soft and Deformable Systems for Space Missions
Compliant robots are increasingly becoming integral to space exploration due to their adaptability, flexibility, and lightweight design. This article reviews categories such as soft, reconfigurable, and hyper‐redundant robots and their evolving role in enhancing space missions.
Hamed Rahimi Nohooji, Holger Voos
wiley +1 more source
Implementing Multimodal Hardware Security with 2D α-In<sub>2</sub>Se<sub>3</sub> Ferroelectric Transistor. [PDF]
Zhang X+11 more
europepmc +1 more source
Automation support for security control assessments. volume 2: hardware asset management
Kelley Dempsey, Paul Eavy, George Moore
openalex +1 more source
A novel in situ XOR encryption/decryption method using a nanoelectromechanical physically unclonable function (NEM‐PUF) is introduced, enhancing security in data transfers between servers/clouds and edge devices. Integrated with the CMOS BEOL process, NEM‐PUFs utilize random stiction for entropy, enabling efficient bitwise XOR operations. This approach
Changha Kim+6 more
wiley +1 more source
A Shared Control Method of Multiobjective Motion Fusion for Surgical Robot
This paper proposes an innovative shared control method that can handle multiple objectives task by integrating various types of controllers. It not only takes into account the priorities among the objectives but also allows for the flexible addition or removal of objective controllers.
Xilin Xiao+7 more
wiley +1 more source
Logic obfuscation technique using configurable gate diffusion input for improved hardware security
K N Baluprithviraj, S. Vijayachitra
openalex +2 more sources
Autonomous Navigation of Bio‐Intelligent Cyborg Insect Based on Insect Visual Perception
The bio‐intelligent cyborg insect (BCI) introduces a noninvasive ultraviolet‐based control method, leveraging natural sensory behaviors for adaptive navigation. By integrating biological and artificial intelligence, BCI minimizes habituation and enhances locomotion in complex environments.
Chowdhury Mohammad Masum Refat+4 more
wiley +1 more source