Results 91 to 100 of about 367,191 (281)

Vision‐Augmented Wearable Interfaces: Bioinspired Approaches for Realistic AI‐Human‐Machine Interaction

open access: yesAdvanced Materials Technologies, EarlyView.
This review presents recent progress in vision‐augmented wearable interfaces that combine artificial vision, soft wearable sensors, and exoskeletal robots. Inspired by biological visual systems, these technologies enable multimodal perception and intelligent human–machine interaction.
Jihun Lee   +4 more
wiley   +1 more source

Privacy Games: Optimal User-Centric Data Obfuscation

open access: yes, 2015
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core   +2 more sources

Soft Robotic Excretory Care Simulator for Nursing Education: Functional and Perceptual Biomimetics Approach

open access: yesAdvanced Robotics Research, EarlyView.
A soft robotic simulator is developed to replicate the digital removal of feces (DRF), a sensitive yet essential nursing procedure. Integrating soft actuators, sensors, and a realistic rectal model, the simulator balances functional fidelity with perceptual realism. Engineering evaluations and nurse feedback confirm its potential to enhance training in
Shoko Miyagawa   +10 more
wiley   +1 more source

Location-semantic-based location privacy protection for road network

open access: yesTongxin xuebao, 2016
Mobile users suffer location privacy leakage threat as enjoy location-based services (LBS).Therefore,it was important to provide effective policy for location privacy protection.Conventional protection approaches were mainly based on spatial cloaking ...
Hui CHEN, Xiao-lin QIN
doaj   +2 more sources

Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things

open access: yes, 2015
In this paper we address the issue of gathering the "informed consent" of an end user in the Internet of Things. We start by evaluating the legal importance and some of the problems linked with this notion of informed consent in the specific context of ...
Copigneaux, Bertrand
core   +1 more source

Road Network-based Location Privacy Protection

open access: yesInternational Journal of Security and Its Applications, 2015
The traditional location privacy protection means mainly employs reliable central server framework, and it mainly applies the anonymous region meeting the k-anonymity at the anonymous server to replace the real location of users. However, the disadvantages of the central server, such as being attacked easily, high communication cost, etc. are disclosed
openaire   +1 more source

Hard‐Magnetic Soft Millirobots in Underactuated Systems

open access: yesAdvanced Robotics Research, EarlyView.
This review provides a comprehensive overview of hard‐magnetic soft millirobots in underactuated systems. It examines key advances in structural design, physics‐informed modeling, and control strategies, while highlighting the interplay among these domains.
Qiong Wang   +4 more
wiley   +1 more source

Integrated Single‐Cell and Spatial Transcriptomics Reveal Cell‐Type‐Specific Immune Regulatory Networks in Maize Responding to Southern Corn Rust

open access: yesAdvanced Science, EarlyView.
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy