Results 91 to 100 of about 367,191 (281)
This review presents recent progress in vision‐augmented wearable interfaces that combine artificial vision, soft wearable sensors, and exoskeletal robots. Inspired by biological visual systems, these technologies enable multimodal perception and intelligent human–machine interaction.
Jihun Lee +4 more
wiley +1 more source
Privacy Games: Optimal User-Centric Data Obfuscation
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core +2 more sources
A soft robotic simulator is developed to replicate the digital removal of feces (DRF), a sensitive yet essential nursing procedure. Integrating soft actuators, sensors, and a realistic rectal model, the simulator balances functional fidelity with perceptual realism. Engineering evaluations and nurse feedback confirm its potential to enhance training in
Shoko Miyagawa +10 more
wiley +1 more source
Location-semantic-based location privacy protection for road network
Mobile users suffer location privacy leakage threat as enjoy location-based services (LBS).Therefore,it was important to provide effective policy for location privacy protection.Conventional protection approaches were mainly based on spatial cloaking ...
Hui CHEN, Xiao-lin QIN
doaj +2 more sources
Information Producers, Information Consumers : Location Data Privacy in Institutional Settings [PDF]
Peer ...
Cottrill, Caitlin Doyle
core
In this paper we address the issue of gathering the "informed consent" of an end user in the Internet of Things. We start by evaluating the legal importance and some of the problems linked with this notion of informed consent in the specific context of ...
Copigneaux, Bertrand
core +1 more source
Road Network-based Location Privacy Protection
The traditional location privacy protection means mainly employs reliable central server framework, and it mainly applies the anonymous region meeting the k-anonymity at the anonymous server to replace the real location of users. However, the disadvantages of the central server, such as being attacked easily, high communication cost, etc. are disclosed
openaire +1 more source
Hard‐Magnetic Soft Millirobots in Underactuated Systems
This review provides a comprehensive overview of hard‐magnetic soft millirobots in underactuated systems. It examines key advances in structural design, physics‐informed modeling, and control strategies, while highlighting the interplay among these domains.
Qiong Wang +4 more
wiley +1 more source
By integrating single‐nuclei and spatial transcriptomics, this study presents a stereoscopic landscape of maize leaf to Puccinia polysora infection. Epidermal and mesophyll cells initiate primary defenses via RLPs/RLKs and jasmonic acid signaling. Cell‐cell communication analyses further reveal the underlying the dynamics of the underlying immune ...
Qiongqiong Wang +16 more
wiley +1 more source
LBS user location privacy protection scheme based on trajectory similarity. [PDF]
Qian K, Li X.
europepmc +1 more source

