Results 31 to 40 of about 58,524 (307)
In‐Hand Singulation, Scooping, and Cable Untangling with a 5‐Dof Tactile‐Reactive Gripper
This article presents a two‐fingered gripper with five degrees of freedom and a vision‐based tactile sensor for dexterous in‐hand manipulation. It performs complex tasks such as object singulation within granular media, scooping and precise card insertion, and cable untangling.
Yuhao Zhou+3 more
wiley +1 more source
The ‘PROTECT’ Essential Elements in Managing Crisis Data Policies
Based on a literature review, policy study, and a conference session discussion, this paper systematically analyzed seven predominant elements in crisis data policies, namely ‘people, resources, operation, technology, ethics, communication, and trust ...
Lili Zhang+6 more
doaj +1 more source
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang+5 more
wiley +1 more source
Automatic Verification Analysis Technology of Network Security Domain
By studying the automatic verification analysis techniques of network security domain, a secure domain topology automatically restore and security domains devices interconnected relations, security domain boundaries and border access control policy ...
Xiaofeng Liu+3 more
doaj +2 more sources
This review systematically examines robotic systems for robot‐assisted transoral surgical procedures, classifying them based on transoral access depth, and evaluates their fundamental design principles, mechanical innovations, algorithmic advancements, and clinical implementation status.
Yuhao Shi+5 more
wiley +1 more source
A Knowledge Graph-Based Consistency Detection Method for Network Security Policies
Network security policy is regarded as a guideline for the use and management of the network environment, which usually formulates various requirements in the form of natural language.
Yaang Chen+6 more
doaj +1 more source
A soft poly (3,4‐ethylenedioxythiophene):poly (styrenesulfonate)‐based electrode enables continuous, high‐quality recording of peripheral nerve activity. A neural network model integrating handcrafted and convolutional neural network‐based features decodes whisker movements with strong generalization, offering insights into peripheral nerve function ...
Liangpeng Chen+22 more
wiley +1 more source
This study uses single‐nucleus RNA sequencing and spatial transcriptomics to investigate penile squamous cell carcinoma (PSCC). It reveals that PSCC tumor cells mimic normal penile epithelium differentiation, independent of HPV status. The Tum_1 subtype shows basal stem‐like characteristics and promotes invasiveness. HPV‐positive basal stem‐like tumors
Hongjian Song+37 more
wiley +1 more source
De-Radicalising Prisoners in Nigeria: developing a basic prison based de-radicalisation programme
The Nigerian Counter Terrorism Strategy recognised that force alone was not enough to combat violent extremist elements in Nigeria and that a multi-faceted approach was required to counter the threat of violent extremism.
Atta Barkindo, Shane Bryans
doaj
βFaar selectively targets and inhibits the GTPase activity of the RAB18 protein, thereby reducing LD volume. Conversely, βFaar promotes nuclear translocation of the transcription factor IRF4 in inguinal white adipose tissue (iWAT), facilitating the browning of white adipose tissue and attenuating body fat accumulation.
Yue Yang+13 more
wiley +1 more source