Results 101 to 110 of about 139,929 (306)

Research of a trusted execution environment module for multiple platforms

open access: yesTongxin xuebao, 2014
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG   +4 more
doaj   +2 more sources

Design and Modeling of a High‐Displacement, Skin‐Integrated Flexible Electromagnetic Actuator for Haptic Interfaces in Virtual Reality

open access: yesAdvanced Robotics Research, EarlyView.
A flexible, skin‐integrated electromagnetic actuator is developed for wearable virtual/augmented reality (VR/AR) haptic systems. A tunable design model enables control over displacement and resonance frequency. The system is validated through a custom VR application with a 6 × 4 actuator array, demonstrating real‐time, spatially targeted tactile ...
Naji Tarabay   +9 more
wiley   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

An IoT-Based Motorcycle Security System Using Arduino and Android for Theft Prevention

open access: yesCompiler
Motorcycle theft remains a prevalent issue, especially in urban areas, where traditional security measures such as mechanical locks and ignition keys are easily bypassed. This research presents an IoT-based motorcycle security system integrating Arduino,
Aris Rakhmadi   +4 more
doaj   +1 more source

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement

open access: yes, 2017
Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the
Asokan, N.   +6 more
core  

AI‐Assisted Self‐Powered Wearable Dual‐Mode Sensor With TENG and Stretchable Optical Fiber for Neurological Disorder Diagnostics

open access: yesAdvanced Science, EarlyView.
This manuscript presents the WDMS platform, an AI‐assisted, self‐powered wearable dual‐mode sensor for tele‐neurology. It integrates a contact–separation TENG insole with stretchable polyurethane optical‐fiber strain sensors to synchronously track plantar pressure and lower‐limb muscle deformation.
Tianliang Li   +12 more
wiley   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Bioinspired Adaptive Leg‐Claw Enables Robust Perching and Grasping for UAVs

open access: yesAdvanced Science, EarlyView.
Inspired by owl limb morphology and bat roosting behavior, this study presents a bioinspired adaptive leg‐claw mechanism that enables UAVs to perform robust and versatile perching and grasping. The design integrates a four‐link tibial structure, tension‐driven deformable feet, and active control, enabling stable perching on various branches and ...
Tianyu Cheng   +6 more
wiley   +1 more source

Low Power Optoelectronic Neuromorphic Memristor for In‐Sensor Computing and Multilevel Hardware Security Communications

open access: yesAdvanced Science, EarlyView.
ABSTRACT Conventional software‐based encryption faces mounting limitations in power efficiency and security, inspiring the development of emerging neuromorphic computing hardware encryption. This study presents a hardware‐level multi‐dimensional encryption paradigm utilizing optoelectronic neuromorphic devices with low energy consumption of 3.3 fJ ...
Bo Sun   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy