Results 31 to 40 of about 27,441 (278)

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +2 more sources

Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

open access: yes, 2011
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett.
Fung C.-H. F.   +5 more
core   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

New provable data transfer from provable data possession and deletion for secure cloud storage

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +1 more source

The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe   +2 more
wiley   +1 more source

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in
Lanjun Dang   +6 more
doaj   +1 more source

IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications

open access: yesIEEE Access, 2018
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang   +5 more
doaj   +1 more source

Entangled cloud storage [PDF]

open access: yes, 2016
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy