Results 111 to 120 of about 154,545 (256)

Physical layer security and covert communication in UAV-ISAC networks: A comprehensive survey

open access: yesJournal of King Saud University: Computer and Information Sciences
Under the rapid development of the low-altitude economy, while unmanned aerial vehicle-assisted integrated sensing and communication (UAV-ISAC) significantly enhances perception accuracy and communication reliability in dynamic network environments, it ...
Haowen Yang   +6 more
doaj   +1 more source

Retractions in Rheumatology: Trends, Causes, and Implications for Research Integrity

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to describe the trends and main reasons for study retraction in rheumatology literature. Methods We reviewed the Retraction Watch database to identify retracted articles in rheumatology. We recorded the main study characteristics, authors’ countries, reasons for retraction, time from publication to retraction, and trends over time ...
Anna Maria Vettori, Michele Iudici
wiley   +1 more source

StegoBackoff: Creating a Covert Channel in Smart Grids Using the Backoff Procedure of IEEE 802.11 Networks

open access: yesEnergies
A smart grid constitutes an electrical infrastructure that integrates communication technologies to optimize electricity production, distribution, and consumption.
Geovani Teca, Marek Natkaniec
doaj   +1 more source

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

Covert Multi-Access Communication with a Non-Covert User

open access: yesICC 2024 - IEEE International Conference on Communications
In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users.
Bounhar, Abdelaziz   +2 more
openaire   +2 more sources

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Current Tracking Adaptive Control of Brushless DC Motors

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
In this paper, the current tracking for Brushless Direct Current motors is approached considering uncertainty in the parameters of the motor's model. An adaptive control scheme to compensate electrical parameters uncertainty is proposed without requiring any knowledge of the mechanical parameters.
Fernanda Ramos‐García   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy