Results 141 to 150 of about 68,165 (294)
Deep steganographic approach for reliable data hiding using convolutional neural networks and adaptive loss optimization. [PDF]
P M, T GK.
europepmc +1 more source
Pak Biawak, a necrobot, embodies an unusual fusion of biology and robotics. Designed to repurpose natural structures after death, it challenges conventional boundaries between nature and engineering. Its movements are precise yet unsettling, raising questions about sustainability, ethics, and the untapped potential of biointegrated machines.
Leo Foulds +2 more
wiley +1 more source
From Lab to Landscape: Environmental Biohybrid Robotics for Ecological Futures
This Perspective explores environmental biohybrid robotics, integrating living tissues, microorganisms, and insects for operation in real‐world ecosystems. It traces the leap from laboratory experiments to forests, wetlands, and urban environments and discusses key challenges, development pathways, and opportunities for ecological monitoring and ...
Miriam Filippi
wiley +1 more source
Crowdsourcing Framework for Security Testing and Verification of Industrial Cyber-Physical Systems. [PDF]
Li Z, Ding Y, Zhao R, Wang S, Li J.
europepmc +1 more source
Antibody drug conjugates deliver their cytotoxic anti‐tubulin or topoisomerase I inhibitor payloads to tumors through cancer cell receptor targeting. The released drug payloads induce cellular changes that interact with radiotherapy resulting in radiosensitization that improves cancer cell kill and stimulates anti‐tumor immune responses.
Jacqueline Lesperance +17 more
wiley +1 more source
Content-adaptive LSB steganography with saliency fusion, ACO dispersion, and hybrid encryption with ablation study. [PDF]
Aljughaiman A, Alrawashdeh R.
europepmc +1 more source
A novel therapy using engineered immune cells (NAC‐T cells) showed promise for refractory malignant mesothelioma. Based on the encouraging preclinical data, the first‐in‐human trial is initiated, demonstrating tolerable safety and promising anti‐tumor activity (ORR 63.6%, DCR 100%, including one CR).
Yan Sun +23 more
wiley +1 more source
Integrating NLP and Ensemble Learning into Next-Generation Firewalls for Robust Malware Detection in Edge Computing. [PDF]
Moila RL, Velempini M.
europepmc +1 more source
Sensorized fingertips are needed to unlock robotic dexterity, versatility, and diverse interactions. Here, 15 identically‐shaped robotic fingertips are benchmarked by a fully automated toolchange system, covering eight different materials and six broadly‐ranging sensing mechanisms.
David Hardman +5 more
wiley +1 more source
Mapping Cyber Bot Behaviors: Understanding Payload Patterns in Honeypot Traffic. [PDF]
Wang S, Tu C, Zhang Y, Zhang M, Xue P.
europepmc +1 more source

