Results 81 to 90 of about 28,210 (305)
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley +1 more source
Covert communication offers a method to transmit messages in such a way that it is not possible to detect that the communication is happening at all. In this work, we report an experimental demonstration of covert communication that is provably secure ...
Arrazola, Juan Miguel +10 more
core
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to ...
Zhijun Han +5 more
doaj +1 more source
Resource Allocation for Covert Communication in D2D Content Sharing: A Matching Game Approach
Device-to-device (D2D) content sharing, as a promising solution to rapidly growing mobile data traffic, is facing serious security issues. Hence, how to ensure its security is challenging and meaningful work.
Xin Shi +4 more
doaj +1 more source
Can Ti‐Based MXenes Serve as Solid Lubricants for Brake Applications? A Tribological Study
This study explores the first implementation of Ti‐based MXenes materials in brake pad friction composite material. The resulting composite material exhibits a 48% reduction in the wear rate; alongside significant improvements are observed for thermal and mechanical properties.
Eslam Mahmoud +7 more
wiley +1 more source
This study proposes a new methodology for producing metal matrix nanocomposites in the solid state. The process involves the plasma‐assisted thermochemical treatment of metallic alloy powders. As a proof‐of‐concept, TiN nanoparticles are synthesized directly on the surface of FeTi intermetallic powder particles, enabling the development of the ...
Deivison Daros Paim +4 more
wiley +1 more source
Screen‐Printed Flexible Piezoelectric Force Sensor Array with Electromagnetic Interference Shielding
This article introduces a flexible screen‐printed piezoelectric sensor array designed for low‐frequency healthcare applications such as tactile sensing and cardiovascular monitoring. The device integrates interface electronics enabling the simultaneous acquisition of up to 128 signals, along with flexible EMI shielding that significantly reduces noise ...
Joseph Faudou +6 more
wiley +1 more source
The use of Artificial Intelligence for the Detection of Covert Channels attacks in New Generation Internet Protocol IPv6 [PDF]
Felwa Rashed AlSenaid
openalex +1 more source
The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems
This research investigates the feasibility of covert and reliable communication between Alice and Bob in the presence of a vigilant adversary, Willie, employing a jammer in a complex Gaussian channel. Alice strategically manipulates the noise-power ratio
Sen Qiao +4 more
doaj +1 more source
A Covert Channel Over VoLTE via Adjusting Silence Periods
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt
Xiaosong Zhang +4 more
doaj +1 more source

