Results 61 to 70 of about 20,376 (274)

Perfectly secure steganography: hiding information in the quantum noise of a photograph

open access: yes, 2015
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan   +4 more
core   +2 more sources

Enabling Stochastic Dynamic Games for Robotic Swarms

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper scales stochastic dynamic games to large swarms of robots through selective agent modeling and variable partial belief space planning. We formulate these games using a belief space variant of iterative Linear Quadratic Gaussian (iLQG). We scale to teams of 50 agents through selective modeling based on the estimated influence of agents ...
Kamran Vakil, Alyssa Pierson
wiley   +1 more source

Artificial Intelligence in Autonomous Mobile Robot Navigation: From Classical Approaches to Intelligent Adaptation

open access: yesAdvanced Intelligent Systems, EarlyView.
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella   +5 more
wiley   +1 more source

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

open access: yes, 2018
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù   +6 more
core   +1 more source

ResearchConnect: An AI‐Powered Platform for Interdisciplinary Research Team Formation and Ideation Development

open access: yesAdvanced Intelligent Systems, EarlyView.
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav   +2 more
wiley   +1 more source

The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe   +2 more
wiley   +1 more source

Practical Provably Secure Flooding for Blockchains

open access: yes, 2022
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang   +4 more
openaire   +3 more sources

Metformin enhances external urethral sphincter integrity and restores continence via AMPK activation in a rat model of stress urinary incontinence

open access: yesAnimal Models and Experimental Medicine, EarlyView.
The pathogenesis of stress urinary incontinence (SUI) is intimately associated with injury to the external urethral sphincter (EUS). In this study, we established an SUI model induced by double vaginal distension and demonstrated that metformin treatment activated the AMPK signaling in the EUS tissue.
Yuting Xu   +7 more
wiley   +1 more source

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things

open access: yesIEEE Access, 2020
Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical services by ...
Kisung Park   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy