Results 131 to 140 of about 74,403 (290)
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Cyber Resilience of Electric Vehicle Charging in Smart Grids: The Dutch Case
As a part of energy transition, the shift from internal combustion engines (ICEs) to electric vehicles (EVs) has accelerated the development of the EV charging infrastructure (EVCI).
Sjors Hijgenaar +3 more
doaj +1 more source
Airport Cyber Security and Cyber Resilience Controls
Cyber Security scares are the main areas of demerits associated with the advent and widespread of internet technology. While the internet has improved life and business processes, the levels of security threats have been increasing proportionally. As such, the web and the related cyber systems have exposed the world to the state of continuous vigilance
openaire +2 more sources
Guide to Australia’s national security capability [PDF]
This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace.
core
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia +3 more
wiley +1 more source
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
Protecting Critical Infrastructure in the EU [PDF]
Haemmerli, Bernard, Renda, Andrea
core +1 more source
Technology for Whom and for What? A Global South View of Tech Diplomacy
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley +1 more source
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley +1 more source

