Results 51 to 60 of about 249,048 (284)

Ada-MAC: An Adaptive MAC Protocol for Real-time and Reliable Health Monitoring,

open access: yes, 2012
IEEE 802.15.4 is regarded as one of the most suitable communication protocols for cyber-physical applications of wireless sensor and actuator networks.
Gao, Ruixia   +4 more
core   +1 more source

Learning-based attacks in cyber-physical systems [PDF]

open access: yes, 2020
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo   +3 more
core   +1 more source

A Review on Biodegradable Materials of Sustainable Soft Robotics and Electronics

open access: yesAdvanced Science, EarlyView.
Biodegradable materials are gaining increasing attention in soft robotics and electronics due to their environmental friendliness, showing great potential for sustainability. In this review, the classification of biodegradable materials, their applications in the field of soft robotics and electronics, as well as the challenges and future prospects ...
Yizhu Xie   +8 more
wiley   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Precise realtime current consumption measurement in IoT TestBed [version 2; peer review: 1 approved, 2 approved with reservations]

open access: yesOpen Research Europe
Background The Internet of Things, similar to wireless sensor networks, has been integrated into the daily life of almost everyone. These wearable, stationary, or mobile devices are in multiple locations, collecting data or monitoring and executing ...
Janis Judvaitis   +5 more
doaj   +1 more source

Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study [PDF]

open access: yes, 2012
Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-
Huang, Heqing   +4 more
core   +1 more source

Dual Rate Control for Security in Cyber-physical Systems

open access: yes, 2015
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop.
Hirzallah, Nabil   +2 more
core   +1 more source

Systematic Benchmarking of a Noise‐Tolerant Conductive Hydrogel Electrode for Epidermal Bioelectronics

open access: yesAdvanced Science, EarlyView.
General schematic of the approach. Abstract Conventional Silver/Silver Chloride (Ag/AgCl) electrodes remain the clinical standard for electrophysiological monitoring but are hindered by poor skin conformity, mechanical rigidity, and signal degradation, particularly under motion or sweat.
Nazmi Alsaafeen   +11 more
wiley   +1 more source

Watermarking for Social Networks Images With Improved Robustness Through Polar Codes

open access: yesIEEE Access
Protecting ownership of digital content is challenging in today’s online world, especially when sharing content through social networks and instant messengers.
Oleg Evsutin   +2 more
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy