期刊文献+
共找到715篇文章
< 1 2 36 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
下载PDF
Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
2
作者 Jian Xu Zhihao Jiang +2 位作者 Andi Wang Chen Wang Fucai Zhou 《Computers, Materials & Continua》 SCIE EI 2018年第12期589-602,共14页
With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verifica... With the development of cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Therefore,much of growing interest has been pursed in the context of the integrity verification of cloud storage.Provable data possession(PDP)and Proofs of retrievablity(POR)are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments.The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have.Unfortunately,most of POR schemes support only static data.Stefanov et al.proposed a dynamic POR,but their scheme need a large of amount of client storage and has a large audit cost.Cash et al.use Oblivious RAM(ORAM)to construct a fully dynamic POR scheme,but the cost of their scheme is also very heavy.Based on the idea which proposed by Cash,we propose dynamic proofs of retrievability via Partitioning-Based Square Root Oblivious RAM(DPoR-PSR-ORAM).Firstly,the notions used in our scheme are defined.The Partitioning-Based Square Root Oblivious RAM(PSR-ORAM)protocol is also proposed.The DPOR-PSR-ORAM Model which includes the formal definitions,security definitions and model construction methods are described in the paper.Finally,we give the security analysis and efficiency analysis.The analysis results show that our scheme not only has the property of correctness,authenticity,next-read pattern hiding and retrievabiltiy,but also has the high efficiency. 展开更多
关键词 Cloud storage proofs of retrievability partitioning framework oblivious RAM
下载PDF
Comments and Research on Proofs of Chain Rule 被引量:1
3
作者 张通 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期100-104,共5页
In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independe... In this paper we point out that the proofs of Chain Rule in many intensively used textbooks are not strict an construct anexa mple of a composite function f(u) which is differentiable with respects t o the independednt variable u, but is not differentiable with respect to the dependent variable u=g(x). A strict proof of Chain Rule is presented. Incon sistency of the form and content of Chain Rule is disclosed. 展开更多
关键词 Chain Rule PROOF unstrict
下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
4
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
下载PDF
Area inside a Circle: Intuitive and Rigorous Proofs
5
作者 Vali Siadat 《American Journal of Computational Mathematics》 2017年第1期102-108,共7页
In this article I conduct a short review of the proofs of the area inside a circle. These include intuitive as well as rigorous analytic proofs. This discussion is important not just from mathematical view point but a... In this article I conduct a short review of the proofs of the area inside a circle. These include intuitive as well as rigorous analytic proofs. This discussion is important not just from mathematical view point but also because pedagogically the calculus books still use circular reasoning today to prove the area inside a circle (also that of an ellipse) on this important historical topic, first illustrated by Archimedes. I offer an innovative approach through the introduction of a theorem, which will lead to proving the area inside a circle avoiding circular argumentation. 展开更多
关键词 Area Circle ELLIPSE CIRCULAR REASONING Intuitive PROOF Rigorous PROOF
下载PDF
Constructive Proofs of the Brouwer Type Coincidence Theorems
6
作者 刘文斌 史少云 黄庆道 《Northeastern Mathematical Journal》 CSCD 2000年第1期36-40,共5页
This note gives constructive proofs of the Brouwer type coincidence theorems via the homotopy method.
关键词 Brouwer type coincidence theorem constructive proof homotopy method
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
7
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
Recurrent Neural Network Inspired Finite-Time Control Design
8
作者 Jianan Liu Shihua Li Rongjie Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1527-1529,共3页
Dear Editor,This letter is concerned with the role of recurrent neural networks(RNNs)on the controller design for a class of nonlinear systems.Inspired by the architectures of RNNs,the system states are stacked accord... Dear Editor,This letter is concerned with the role of recurrent neural networks(RNNs)on the controller design for a class of nonlinear systems.Inspired by the architectures of RNNs,the system states are stacked according to the dynamic along with time while the controller is represented as the neural network output.To build the bridge between RNNs and finite-time controller,a novel activation function is imposed on RNNs to drive the convergence of states at finite-time and propel the overall control process smoother.Rigorous stability proof is briefly provided for the convergence of the proposed finite-time controller.At last,a numerical simulation example is presented to illustrate the efficiency of the proposed strategy.Neural networks can be classified as static(feedforward)and dynamic(recurrent)nets[1].The former nets do not perform well in dealing with training data and using any information of the local data structure[2].In contrast to the feedforward neural networks,RNNs are constituted by high dimensional hidden states with dynamics. 展开更多
关键词 DYNAMICS FINITE PROOF
下载PDF
Thermally Conductive and UV-EMI Shielding Electronic Textiles for Unrestricted and Multifaceted Health Monitoring
9
作者 Yidong Peng Jiancheng Dong +8 位作者 Jiayan Long Yuxi Zhang Xinwei Tang Xi Lin Haoran Liu Tuoqi Liu Wei Fan Tianxi Liu Yunpeng Huang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期149-162,共14页
Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,... Skin-attachable electronics have garnered considerable research attention in health monitoring and artificial intelligence domains,whereas susceptibility to elec-tromagnetic interference(EMI),heat accumulation issues,and ultraviolet(UV)-induced aging problems pose significant constraints on their potential applications.Here,an ultra-elas-tic,highly breathable,and thermal-comfortable epidermal sensor with exceptional UV-EMI shielding performance and remarkable thermal conductivity is developed for high-fidelity monitoring of multiple human electrophysiological signals.Via filling the elastomeric microfibers with thermally conductive boron nitride nanoparticles and bridging the insulating fiber interfaces by plating Ag nanoparticles(NPs),an interwoven thermal con-ducting fiber network(0.72 W m^(-1) K^(-1))is constructed benefiting from the seamless thermal interfaces,facilitating unimpeded heat dissipation for comfort skin wearing.More excitingly,the elastomeric fiber substrates simultaneously achieve outstanding UV protection(UPF=143.1)and EMI shielding(SET>65,X-band)capabilities owing to the high electrical conductivity and surface plasmon resonance of Ag NPs.Furthermore,an electronic textile prepared by printing liquid metal on the UV-EMI shielding and thermally conductive nonwoven textile is finally utilized as an advanced epidermal sensor,which succeeds in monitoring different electrophysiological signals under vigorous electromagnetic interference.This research paves the way for developing protective and environmentally adaptive epidermal electronics for next-generation health regulation. 展开更多
关键词 Skin electronics Thermal regulating textiles Electromagnetic interference shielding Ultraviolet proof Health monitoring
下载PDF
Glia-to-neuron reprogramming to the rescue?
10
作者 Jack W.Hickmott Cindi M.Morshead 《Neural Regeneration Research》 SCIE CAS 2025年第5期1395-1396,共2页
Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells c... Over the last two decades,the dogma that cell fate is immutable has been increasingly challenged,with important implications for regenerative medicine.The brea kth rough discovery that induced pluripotent stem cells could be generated from adult mouse fibroblasts is powerful proof that cell fate can be changed.An exciting extension of the discovery of cell fate impermanence is the direct cellular reprogram ming hypothesis-that terminally differentiated cells can be reprogrammed into other adult cell fates without first passing through a stem cell state. 展开更多
关键词 programming PASSING proof
下载PDF
Corrigendum: MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons
11
《Neural Regeneration Research》 SCIE CAS 2025年第4期945-945,共1页
There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Ne... There is an error in the name of the cell line in the abstract of the published paper“MicroRNA-502-3p regulates GABAergic synapse function in hippocampal neurons”published on pages 2698-2707,Issue 12,Volume 19 of Neural Regeneration Research(Sharma et al.,2024),because of oversight during final proof checking.The correct description should be“human-GABA receptor A-α1/β2/γ2L human embryonic kidney(HEK)recombinant cell line.”The authors apologize for any inconvenience this correction may cause for readers and editors of Neural Regeneration Research. 展开更多
关键词 FUNCTION PROOF correction
下载PDF
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
12
作者 Xiaohui Yang Kun Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1843-1859,共17页
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d... Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data. 展开更多
关键词 Blockchain data transactions zero-knowledge proof game pricing
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
13
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
14
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
Mathematical Wave Functions and 3D Finite Element Modelling of the Electron and Positron
15
作者 Declan Traill 《Journal of Applied Mathematics and Physics》 2024年第4期1134-1162,共29页
The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric an... The wave/particle duality of particles in Physics is well known. Particles have properties that uniquely characterize them from one another, such as mass, charge and spin. Charged particles have associated Electric and Magnetic fields. Also, every moving particle has a De Broglie wavelength determined by its mass and velocity. This paper shows that all of these properties of a particle can be derived from a single wave function equation for that particle. Wave functions for the Electron and the Positron are presented and principles are provided that can be used to calculate the wave functions of all the fundamental particles in Physics. Fundamental particles such as electrons and positrons are considered to be point particles in the Standard Model of Physics and are not considered to have a structure. This paper demonstrates that they do indeed have structure and that this structure extends into the space around the particle’s center (in fact, they have infinite extent), but with rapidly diminishing energy density with the distance from that center. The particles are formed from Electromagnetic standing waves, which are stable solutions to the Schrödinger and Classical wave equations. This stable structure therefore accounts for both the wave and particle nature of these particles. In fact, all of their properties such as mass, spin and electric charge, can be accounted for from this structure. These particle properties appear to originate from a single point at the center of the wave function structure, in the same sort of way that the Shell theorem of gravity causes the gravity of a body to appear to all originate from a central point. This paper represents the first two fully characterized fundamental particles, with a complete description of their structure and properties, built up from the underlying Electromagnetic waves that comprise these and all fundamental particles. 展开更多
关键词 ELECTRON POSITRON Wave Function Solution Electromagnetic Spin Mass Charge Proof Fundamental Particle Properties Quantum Mechanics Classical Physics Computer 3D Model Schrödinger Equation RMS KLEIN GORDON Electric Magnetic Lorentz Invariant Hertzian Vector Point Potential Field Density Phase Flow Attraction REPULSION Shell Theorem Ehrenfest VIRIAL Normalization Harmonic Oscillator
下载PDF
A REVIEW AND PROSPECT OF READABLE MACHINE PROOFS FOR GEOMETRY THEOREMS 被引量:3
16
作者 Jianguo JIANG Jingzhong ZHANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第4期802-820,共19页
After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable ... After half a century research, the mechanical theorem proving in geometries has become an active research topic in the automated reasoning field. This review involves three approaches on automated generating readable machine proofs for geometry theorems which include search methods, coordinate-free methods, and formal logic methods. Some critical issues about these approaches are also discussed. Furthermore, the authors propose three further research directions for the readable machine proofs for geometry theorems, including geometry inequalities, intelligent geometry softwares and machine learning. 展开更多
关键词 Automated geometry reasoning coordinate-free method formal logic method geometric inequality intelligent geometry software machine learning mechanical theorem proving readable machine proof search method.
原文传递
Experimentally testing Bell's theorem based on Hardy's nonlocal ladder proofs 被引量:2
17
作者 GUO WeiJie FAN DaiHe WEI LianFu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第2期21-25,共5页
Bell's theorem argues the existence of quantum nonlocality which goes basically against the hidden variable theory (HVT). Many experiments have been done via testing the violations of Bell's inequalities to statis... Bell's theorem argues the existence of quantum nonlocality which goes basically against the hidden variable theory (HVT). Many experiments have been done via testing the violations of Bell's inequalities to statistically verify the Bell's theorem. Alternatively, by testing the Hardy's ladder proofs we experimentally demonstrate the deterministic violation of HVT and thus confirm the quantum nonlocality. Our tests are implemented with non-maximal entangled photon pairs generated by spontaneous parametric down conversions (SPDCs). We show that the degree freedom of photon entanglement could be significantly enhanced by using interference filters. As a consequence, the Hardy's ladder proofs could be tested and Bell's theorem is verified robustly. The probability of violating the locality reach to 41.9%, which is close to the expectably ideal value 46.4% for the photon pairs with degree of entanglement e = 0.93. The higher violating probability is possible by further optimizing the experimental parameters. 展开更多
关键词 quantum nonlocality entanglement production Hardy's proof
原文传递
Corigendum to“Efficient benzaldehyde photosynthesis coupling photocatalytic hydrogen evolution”[J.Energy Chem.66(2022)52-60] 被引量:1
18
作者 Juanjuan Luo Min Wang +1 位作者 Lisong Chen Jianlin Shi 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第2期122-122,共1页
It is regretful that the wrong image of Fig.4 was used in the paperin the final proof stage by editor.The correct one should be as follow.
关键词 BENZALDEHYDE PROOF COUPLING
下载PDF
Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform 被引量:1
19
作者 Xiangmin Guo Guangjun Liang +1 位作者 Jiayin Liu Xianyi Chen 《Computers, Materials & Continua》 SCIE EI 2023年第12期3305-3323,共19页
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading... Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The“Data Island”problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefits of the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology. 展开更多
关键词 Blockchain Internet of Things(IoT) blockchain based cognitive computing Hybridized Data Driven Cognitive Computing(HD2C) Federated Learning(FL) Proof of Authority(PoA)
下载PDF
A bioinspired flexible optical sensor for force and orientation sensing
20
作者 Lei Zhang Limin Tong 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2023年第5期4-6,共3页
Flexible optical sensors have been an emerging paradigm for applications in robotics,healthcare,and human–machine interfaces due to their high sensitivity,fast response,and anti-electromagnetic interference.Recently,... Flexible optical sensors have been an emerging paradigm for applications in robotics,healthcare,and human–machine interfaces due to their high sensitivity,fast response,and anti-electromagnetic interference.Recently,Marques reports a bioinspired multifunctional flexible optical sensor(BioMFOS),achieving a forces sensitivity of 13.28μN,and a spatial resolution of 0.02 mm.The BioMFOS has a small dimension(around 2 cm)and a light weight(0.8 g),making it suitable for wearable application and clothing integration.As proof-of-concept demonstrations,monitoring of finger position,trunk movements,and respiration rate are realized,implying their prominent applications in remote healthcare,intelligent robots,assistance devices teleoperation,and human-machine interfaces. 展开更多
关键词 optical PROOF sensor
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部