Results 91 to 100 of about 1,782,571 (254)
Sliding Mode Control in Aerospace Applications: A Survey
ABSTRACT Sliding mode control (SMC) enjoys robustness to matched and unmatched (in the case of minimum phase input‐output dynamics) bounded perturbations, and finite time convergence. Second‐order and higher‐order sliding mode control systems (2‐SMC/HOSMC) retain all the advantages of sliding mode control, but in addition can be applied to systems of ...
Yuri Shtessel, Christopher Edwards
wiley +1 more source
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
WSN key recovery attack based on symmetric matrix decomposition
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI +5 more
doaj +2 more sources
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser
The Algebraic Eraser (AE) is a public key protocol for sharing information over an insecure channel using commutative and noncommutative groups; a concrete realization is given by Colored Burau Key Agreement Protocol (CBKAP).
Goldfeld, Dorian, Gunnells, Paul E.
core
Analysing Relations involving small number of Monomials in AES S- Box [PDF]
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core +1 more source
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri +3 more
wiley +1 more source
Quantum State‐Resolved Photodissociation Dynamics Study of Transition‐Metal Carbonyl and Nitrosyl
State‐resolved scattering measurements provide experimental visualization of nuclear motions in reacting molecules. Carbonyls and nitrosyls are typical ligands in most of the transition‐metal complexes, which undergo dissociation upon visible and ultraviolet photoexcitation.
Keigo Nagamori +2 more
wiley +1 more source
Attack Tree Metrics are Operad Algebras
Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once.
openaire +3 more sources
Algebraic Side-Channel Attacks
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu +2 more
openaire +1 more source
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley +1 more source

