Results 61 to 70 of about 68,165 (294)
The results demonstrate a simulation‐driven workflow that applies LSB topology optimization with additive manufacturing constraints to mission‐specific load cases, integrating European Cooperation for Space Standardization compliant verification and manufacturability to develop structurally efficient rover suspension components.
Stelios K. Georgantzinos +11 more
wiley +1 more source
Edge Information Hub-Empowered 6G NTN: Latency-Oriented Resource Orchestration and Configuration
Quick response to disasters is crucial for saving lives and reducing loss. This requires low-latency uploading of situation information to the remote command center.
Yueshan Lin +5 more
doaj +1 more source
An Edge-Based Architecture for Offloading Model Predictive Control for UAVs
Thanks to the development of 5G networks, edge computing has gained popularity in several areas of technology in which the needs for high computational power and low time delays are essential. These requirements are indispensable in the field of robotics,
Achilleas Santi Seisa +3 more
doaj +1 more source
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
Lipid nanoparticles (LNPs) are optimized to co‐deliver Cas9‐encoding messenger RNA (mRNA), a single guide RNA (sgRNA) targeting the endogenous cystic fibrosis transmembrane conductance regulator (CFTR) gene, and homologous linear double‐stranded donor DNA (ldsDNA) templates encoding CFTR.
Ruth A. Foley +12 more
wiley +1 more source
On Ladder Logic Bombs in Industrial Control Systems
In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e.
D-Y Kim +5 more
core +1 more source
Self‐Immolative Activatable Nanoassembly toward Immuno‐Photodynamic Therapy in TME
A quinone methide‐gated, self‐immolative, H2O2‐responsive nano‐photosensitizer (Pyz/PS) is developed for targeted immuno‐photodynamic therapy. Pyz/PS selectively activates within tumor microenvironments, restores photosensitizer activity, generates ROS, and depletes intracellular GSH, enhancing oxidative stress.
Jing Li +10 more
wiley +1 more source
A Sort-Last Rendering System over an Optical Backplane [PDF]
Sort-Last is a computer graphics technique for rendering extremely large data sets on clusters of computers. Sort-Last works by dividing the data set into even-sized chunks for parallel rendering and then composing the images to form the final result ...
Yasuhiro Kirihata +3 more
doaj
Analysis of Approaches to Detecting Attacks in Encrypted Traffic
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj +1 more source
Android Malware Clustering through Malicious Payload Mining
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos +7 more
core +1 more source

