Results 91 to 100 of about 152,709 (325)
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier +1 more
core
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang +5 more
wiley +1 more source
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye +16 more
wiley +1 more source
Virtualization of the Encryption Card for Trust Access in Cloud Computing
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu +5 more
doaj +1 more source
Hard‐Magnetic Soft Millirobots in Underactuated Systems
This review provides a comprehensive overview of hard‐magnetic soft millirobots in underactuated systems. It examines key advances in structural design, physics‐informed modeling, and control strategies, while highlighting the interplay among these domains.
Qiong Wang +4 more
wiley +1 more source
A Review on Sensor Technologies, Control Approaches, and Emerging Challenges in Soft Robotics
This review provides an introspective of sensors and controllers in soft robotics. Initially describing the current sensing methods, then moving on to the control methods utilized, and finally ending with challenges and future directions in soft robotics focusing on the material innovations, sensor fusion, and embedded intelligence for sensors and ...
Ean Lovett +5 more
wiley +1 more source
Open-TEE - An Open Virtual Trusted Execution Environment
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N. +3 more
core +1 more source
TacScope: A Miniaturized Vision‐Based Tactile Sensor for Surgical Applications
TacScope is a compact, vision‐based tactile sensor designed for robot‐assisted surgery. By leveraging a curved elastomer surface with pressure‐sensitive particle redistribution, it captures high‐resolution 3D tactile feedback. TacScope enables accurate tumor detection and shape classification beneath soft tissue phantoms, offering a scalable, low‐cost ...
Md Rakibul Islam Prince +3 more
wiley +1 more source
Protecting Private Data in the Cloud [PDF]
Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company.
Aslam, Mudassar, Rasmusson, Lars
core +1 more source

