Results 81 to 90 of about 1,200 (188)
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph.
José Roberto Castilho Piqueira +3 more
doaj +1 more source
ABSTRACT The paper examines the financial balances of the US economy. Government is the main borrower and households and the foreign sector the main lenders. Business net lending is minimal. The balances and their underlying transactions contradict the loanable funds theory and its “global savings glut” variation.
Michalis Nikiforos, Lance Taylor
wiley +1 more source
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this
Ferhat Erata +3 more
doaj +1 more source
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti +2 more
wiley +1 more source
ABSTRACT On April 6, 2009, central Italy was hit by a Mw6.1$$ {M}_w\kern0.3em 6.1 $$ earthquake that caused 308 victims in the city and province of L'Aquila; subsequently, in 2016, two Mw6+$$ {M}_w\kern0.3em 6+ $$ shocks were recorded in an area located a few dozen kilometers further north, respectively in Amatrice and Norcia.
Elisa Varini +2 more
wiley +1 more source
News shocks, consumer confidence and business cycles
Abstract We study the causal effects of consumer sentiment shocks on macroeconomic aggregates. By constructing a novel instrument based on major non‐economic news shocks in the USA over 1969–2022, and opinion polls around these events, we identify exogenous changes in consumer confidence.
Syed M. Hussain, Zara Liaqat
wiley +1 more source
Abstract We establish the connection between the Steinitz problem for ordering vector families in arbitrary norms and its variant for not necessarily zero‐sum families consisting of “nearly unit” vectors.
Gergely Ambrus, Rainie Heck
wiley +1 more source
Algebraic Adversarial Attacks on Integrated Gradients
Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety critical systems. Path methods are one such class of attribution methods susceptible to adversarial attacks. Adversarial learning is typically phrased as a constrained optimisation problem.
Simpson, Lachlan +5 more
openaire +2 more sources
ABSTRACT The contribution deals with algebraic multigrid (AMG) based preconditioning methods for the iterative solution of a coupled linear system of equations arising in numerical simulations of failure of quasi‐brittle materials using generalized continuum approaches.
Nasser Alkmim +4 more
wiley +1 more source
Holographic microlithography enables the fabrication of fully connected 3D liquid crystalline structures in a single exposure. The process maintains precise control over the director orientation within the entire object, preventing local director distortions typically observed in sequential printing.
Lovish Gulati +8 more
wiley +1 more source

