Results 221 to 230 of about 112,314 (333)
Experiences With a Last Meter Delivery Robot
ABSTRACT The steady growth of e‐commerce is a consolidated trend continuously increasing the number of parcels delivered worldwide. Conventionally, in logistics, last mile delivery has been the area of study covering the last step of a parcel delivery process: from the nearest distribution center to the customer.
Ricard Bitriá +3 more
wiley +1 more source
On the Optimal File Size of Capacity-Achieving Byzantine-Resistant Private Information Retrieval Schemes. [PDF]
Kruglik S, Kiah HM, Dau SH, Wang H.
europepmc +1 more source
ABSTRACT This work presents a non‐geometrical navigation approach based on a purely topological understanding of underground environments. By conceptualizing subterranean scenarios as a set of tunnels that intersect with each other, and taking a navigation approach based on topological instructions, we simplify the navigation problem to the sequential ...
Lorenzo Cano +2 more
wiley +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
A new (k,n) verifiable secret image sharing scheme (VSISS)
Amitava Nag +3 more
openalex +1 more source
Vector Field‐Based Collision‐Free Navigation in Tunnel‐Like Environments
ABSTRACT Tunnel‐like environments, renowned for their vast scale, confined spaces, and limited visibility, present significant challenges for autonomous robot navigation. This study addresses the critical issue of guiding robots through such environments while ensuring collision‐free navigation and maintaining a specified safety margin from both tunnel
Bao Jianjun +5 more
wiley +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
“There Are Places Full of Beauty”: Desettling High School Students' Scientific Writing
ABSTRACT This study contributes to desettling and expanding expectations about the forms of scientific language that belong in students' scientific writing. The primary empirical focus is the analysis of 52 high school student abstracts articulating community‐based investigations, submitted as part of their participation in a student conference in a ...
Alejandra Frausto Aceves
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source

