Results 231 to 240 of about 522,468 (334)
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
Crater Observing Bioinspired Rolling Articulator (COBRA)
Crater Observing Bio‐inspired Rolling Articulator (COBRA) is a modular, snake‐inspired robot that addresses the mobility challenges of extraterrestrial exploration sites such as Shackleton Crater. Incorporating snake‐like gaits and tumbling locomotion, COBRA navigates both uneven surfaces and steep crater walls.
Adarsh Salagame +4 more
wiley +1 more source
Novel structures of chaos-based parallel multiple image encryption and FPGA implementation. [PDF]
Hoang TM +4 more
europepmc +1 more source
An Exhaustive Examination of Architectural Methods for Hardware Security Mechanisms in IoT Devices [PDF]
Wael Abdulateef Jasim +4 more
openalex +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
A cost effective machine learning based network intrusion detection system using Raspberry Pi for real time analysis. [PDF]
Wijethilaka RWKS, Yapa K, Siriwardena D.
europepmc +1 more source
A compact and flexible wearable force myography sensor based on optical fiber technology detects muscle activity through pressure‐induced light loss. The sensor offers high sensitivity for detecting subtle force and finger motion changes, along with excellent signal stability under dynamic and sweating conditions.
Chongyoung Chung +3 more
wiley +1 more source
OntoSecAI: Ontology-driven security automation for AI-enabled systems. [PDF]
Ullah U, Haleem M, Ullah A.
europepmc +1 more source
Secure LSI Design: Solutions to Hardware Security and Hardware Vulnerability
openaire +2 more sources

