Results 141 to 150 of about 139,929 (306)
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee +7 more
wiley +1 more source
Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui +3 more
doaj
This work presents a flexible, battery‐free sensor that forms a closed‐loop feedback system for smart compression therapy devices. Its scalable surface‐mount manufacturing, compact form factor, and wireless communication enable seamless integration with a wide range of active compression garments, improving user experience and therapeutic outcomes ...
Sinuo Zhao +11 more
wiley +1 more source
Hybrid Framework for Secure Low-Power Data Encryption with Adaptive Payload Compression in Resource-Constrained IoT Systems. [PDF]
Choi YR, Jeong HY, Moon S.
europepmc +1 more source
An Attention‐Assisted Machine Learning System for Deep Microorganism Image Classification
An attention‐assisted DenseNet201 framework was developed for the classification of eight microorganism classes from microscopic images. The proposed model improved classification performance and achieved an accuracy of 87.38%. Advances in microbiology and environmental health fundamentally depend on precise and timely microorganism identification ...
Yujie Li +6 more
wiley +1 more source
FEN-AKA: a lightweight three-party authentication protocol for UAV in dynamic noise environments
To address unreliable UAV communications in high-noise, strong-interference environments, a lightweight three-party authentication protocol was proposed using noisy physical unclonable function (PUF) and fuzzy extractors.
SONG Jianhua, LIU Shiwei, ZHANG Yan
doaj
MIGS: A Modular Edge Gateway with Instance-Based Isolation for Heterogeneous Industrial IoT Interoperability. [PDF]
Ai Y, Zhu Y, Jiang Y, Deng Y.
europepmc +1 more source
Feasible Analysis on Hardware Security Module With Digital Voice Assistants Device
Rizzo Mungka Anak Rechie +3 more
openalex +1 more source
Hardware Security Module Specifications
Report on HSM specifications and final design.
openaire +1 more source
Optical Flow Enables Hand Tracking With EyeGlove Low‐Cost Cameras in Confined Environments
A cost‐effective (<£150) hand‐wearable stereo vision system, EyeGlove, is proposed to support visual inspection in confined environments. The system integrates disjointed low‐cost cameras to enable dexterous camera manipulation and wearable display unit for real‐time interaction.
Erhui Sun +3 more
wiley +1 more source

