Results 61 to 70 of about 68,165 (294)

Design and Prototyping of Topology‐Optimized, Additively Manufactured Lightweight Components for Space Robotic Systems: A Case Study

open access: yesAdvanced Engineering Materials, EarlyView.
The results demonstrate a simulation‐driven workflow that applies LSB topology optimization with additive manufacturing constraints to mission‐specific load cases, integrating European Cooperation for Space Standardization compliant verification and manufacturability to develop structurally efficient rover suspension components.
Stelios K. Georgantzinos   +11 more
wiley   +1 more source

Edge Information Hub-Empowered 6G NTN: Latency-Oriented Resource Orchestration and Configuration

open access: yesIEEE Open Journal of the Communications Society
Quick response to disasters is crucial for saving lives and reducing loss. This requires low-latency uploading of situation information to the remote command center.
Yueshan Lin   +5 more
doaj   +1 more source

An Edge-Based Architecture for Offloading Model Predictive Control for UAVs

open access: yesRobotics, 2022
Thanks to the development of 5G networks, edge computing has gained popularity in several areas of technology in which the needs for high computational power and low time delays are essential. These requirements are indispensable in the field of robotics,
Achilleas Santi Seisa   +3 more
doaj   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

Lipid Nanoparticles for the Delivery of CRISPR/Cas9 Machinery to Enable Site‐Specific Integration of CFTR and Mutation‐Agnostic Disease Rescue

open access: yesAdvanced Functional Materials, EarlyView.
Lipid nanoparticles (LNPs) are optimized to co‐deliver Cas9‐encoding messenger RNA (mRNA), a single guide RNA (sgRNA) targeting the endogenous cystic fibrosis transmembrane conductance regulator (CFTR) gene, and homologous linear double‐stranded donor DNA (ldsDNA) templates encoding CFTR.
Ruth A. Foley   +12 more
wiley   +1 more source

On Ladder Logic Bombs in Industrial Control Systems

open access: yes, 2017
In industrial control systems, devices such as Programmable Logic Controllers (PLCs) are commonly used to directly interact with sensors and actuators, and perform local automatic control. PLCs run software on two different layers: a) firmware (i.e.
D-Y Kim   +5 more
core   +1 more source

Self‐Immolative Activatable Nanoassembly toward Immuno‐Photodynamic Therapy in TME

open access: yesAdvanced Functional Materials, EarlyView.
A quinone methide‐gated, self‐immolative, H2O2‐responsive nano‐photosensitizer (Pyz/PS) is developed for targeted immuno‐photodynamic therapy. Pyz/PS selectively activates within tumor microenvironments, restores photosensitizer activity, generates ROS, and depletes intracellular GSH, enhancing oxidative stress.
Jing Li   +10 more
wiley   +1 more source

A Sort-Last Rendering System over an Optical Backplane [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2005
Sort-Last is a computer graphics technique for rendering extremely large data sets on clusters of computers. Sort-Last works by dividing the data set into even-sized chunks for parallel rendering and then composing the images to form the final result ...
Yasuhiro Kirihata   +3 more
doaj  

Analysis of Approaches to Detecting Attacks in Encrypted Traffic

open access: yesСовременные информационные технологии и IT-образование, 2021
The automatic detection of network intrusions has been under active study since the 1980s. Of particular interest is the detection of attacks in encrypted web traffic, the percentage of which on the Internet is increasing.
Marina Polyanskaya
doaj   +1 more source

Android Malware Clustering through Malicious Payload Mining

open access: yes, 2017
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy