Results 91 to 100 of about 1,782,571 (254)

Sliding Mode Control in Aerospace Applications: A Survey

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT Sliding mode control (SMC) enjoys robustness to matched and unmatched (in the case of minimum phase input‐output dynamics) bounded perturbations, and finite time convergence. Second‐order and higher‐order sliding mode control systems (2‐SMC/HOSMC) retain all the advantages of sliding mode control, but in addition can be applied to systems of ...
Yuri Shtessel, Christopher Edwards
wiley   +1 more source

Initial State Privacy of Nonlinear Systems on Riemannian Manifolds

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley   +1 more source

WSN key recovery attack based on symmetric matrix decomposition

open access: yesTongxin xuebao, 2018
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI   +5 more
doaj   +2 more sources

Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser

open access: yes, 2011
The Algebraic Eraser (AE) is a public key protocol for sharing information over an insecure channel using commutative and noncommutative groups; a concrete realization is given by Colored Burau Key Agreement Protocol (CBKAP).
Goldfeld, Dorian, Gunnells, Paul E.
core  

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yes, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

Quantum State‐Resolved Photodissociation Dynamics Study of Transition‐Metal Carbonyl and Nitrosyl

open access: yesThe Chemical Record, EarlyView.
State‐resolved scattering measurements provide experimental visualization of nuclear motions in reacting molecules. Carbonyls and nitrosyls are typical ligands in most of the transition‐metal complexes, which undergo dissociation upon visible and ultraviolet photoexcitation.
Keigo Nagamori   +2 more
wiley   +1 more source

Attack Tree Metrics are Operad Algebras

open access: yes2024 IEEE 37th Computer Security Foundations Symposium (CSF)
Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once.
openaire   +3 more sources

Algebraic Side-Channel Attacks

open access: yes, 2009
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu   +2 more
openaire   +1 more source

Measuring the time‐varying market efficiency in the prewar and wartime Japanese stock market, 1924–1943

open access: yesAsia‐Pacific Economic History Review, Volume 65, Issue 1, Page 131-159, March 2025.
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley   +1 more source

Home - About - Disclaimer - Privacy