Results 191 to 200 of about 2,442,732 (352)
Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform
Shammya Shananda Saha+4 more
openalex +2 more sources
A novel risk assessment approach that integrates the fuzzy set theory and Z‐numbers with multicriteria decision‐making techniques (Delphi, decision‐making trial and evaluation laboratory, analytic network process, and VIseKriterijumska Optimizacija I Kompromisno Resenje) to manage uncertainty and prioritize human–robot collaboration risks. A real‐world
Emine Bozkus, İhsan Kaya
wiley +1 more source
A passive, tunable perching mechanism enables aerial robots to reliably perch onto smooth surfaces. The design integrates a bistable mechanism with a soft suction cup and SMA actuators for active tuning. Experiments demonstrate robust performance by adapting to varying contact speeds and surface orientation misalignments, enabling diverse perching ...
Mahmud Hasan Saikot+4 more
wiley +1 more source
An efficient signature aggregation scheme with antenna hardware implementation for VANETs. [PDF]
Priyadharshini A+4 more
europepmc +1 more source
5G hardware supply chain security through physical measurements
James C. Booth+5 more
openalex +1 more source
Reliability and Security of AI Hardware
In recent years, Artificial Intelligence (AI) systems have achieved revolutionary capabilities, providing intelligent solutions that surpass human skills in many cases. However, such capabilities come with power-hungry computation workloads. Therefore, the implementation of hardware acceleration becomes as fundamental as the software design to improve ...
Gnad, Dennis+12 more
openaire +1 more source
In this contribution, it is shown that miniaturized nerve stimulation implants can be used in collaborative networks. Inductive links and ultrasound are combined to supply these implants with energy and data; the advantages and disadvantages of each method, as well as safety risks and possibilities for improvement are discussed and the best ...
Benedikt Szabo+5 more
wiley +1 more source
Securing IoMT data with Algorand blockchain, XChaCha20-Poly1305 encryption, and decentralized storage alternatives. [PDF]
K D, P S UP.
europepmc +1 more source
Hardware-Software Co-Design for Security: ECC Processor Example [PDF]
Arnaud Tisserand
openalex