Electrically Driven Liquid Crystal Elastomer Self-Oscillators via Rheostat Feedback Mechanism. [PDF]
Li K, Li Z, Zhou L.
europepmc +1 more source
A Review of Modeling and Control Techniques for Unmanned Aerial Vehicles
By systematically classifying UAV modeling techniques and comparing control methods, this paper addresses a notable gap in the current literature. Furthermore, it highlights emerging trends and challenges in UAV control systems, providing valuable insights to guide future research toward enhancing the stability, efficiency, and adaptability of ...
Elisabeth Andarge Gedefaw+2 more
wiley +1 more source
Analytical and numerical computations for bioconvective flow Maxwell nanofluid with variable thermal properties using homotopy analysis method and finite difference scheme. [PDF]
Alzahrani J.
europepmc +1 more source
Theoretical Tolerance Modelling of Dynamics and Stability for Axially Functionally Graded (AFG) Beams. [PDF]
Jędrysiak J.
europepmc +1 more source
Maximizing NMR Sensitivity: A Guide to Receiver Gain Adjustment
NMR applications expand with technological advances, but sensitivity remains a key challenge addressed by methods like hyperpolarization. Optimizing signal‐to‐noise (SNR) is complex, especially in hyperpolarization where automatic receiver gain (RG) adjustment is difficult.
Josh P. Peters+3 more
wiley +1 more source
Two-scale convergence analysis and numerical simulation for periodic Kirchhoff plates. [PDF]
Huang Z, Zeng X, Wang C, Liu C.
europepmc +1 more source
Safety Filters Against Actuator Attacks
ABSTRACT This manuscript focuses on mitigating the effect of deception attacks on control signals, that is, in the presence of an adversary that tampers with data coming from the controller to the system actuators in order to degrade the plant performance.
Cédric Escudero+4 more
wiley +1 more source
Formation of a Neuronal Membrane Model: A Quartz Crystal Microbalance with Dissipation Monitoring Study. [PDF]
Kamaloo E, Camesano TA, Nagarajan R.
europepmc +1 more source
First Detection and Tunneling Time of a Quantum Walk. [PDF]
Ni Z, Zheng Y.
europepmc +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source