Results 91 to 100 of about 1,213,263 (334)
An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and ...
H. Kure, Shareeful Islam, M. Razzaque
semanticscholar +1 more source
According to Newton's second law of motion, we humans describe a dynamical system with a differential equation, which is naturally discretized into a difference equation whenever a computer is used.
Huang, Lirong
core
Cyber-Virtual Systems: Simulation, Validation & Visualization [PDF]
We describe our ongoing work and view on simulation, validation and visualization of cyber-physical systems in industrial automation during development, operation and maintenance.
Blech, Jan Olaf +3 more
core
SIMON: A Domain-Agnostic Framework for Secure Design and Validation of Cyber Physical Systems [PDF]
Rohith Yanambaka Venkata
openalex +1 more source
Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen +10 more
wiley +1 more source
SwinDenoising: A Local and Global Feature Fusion Algorithm for Infrared Image Denoising
Infrared image denoising is a critical task in various applications, yet existing methods often struggle with preserving fine details and managing complex noise patterns, particularly under high noise levels.
Wenhao Wu +4 more
doaj +1 more source
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg +3 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
The conventional approach to phase reconstruction in Reflective Ghost Imaging (RGI) typically involves the introduction of three reference screens into the reference path, deeming the Fourier transform step indispensable.
Ziyan Chen, Jing Cheng, Heng Wu
doaj +1 more source
Abstract Internal exclusion (isolation) is a behaviour management approach involving the temporary relocation of a pupil from their classroom to a designated isolation space as a consequence of disruptive behaviour. We present the first study of prevalence (i.e., what proportion of young people are isolated?), inequalities (i.e., who is more likely to ...
Emma Thornton +3 more
wiley +1 more source

