Results 241 to 250 of about 96,539 (341)
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach. [PDF]
Negi D, Kumar R, Kumar V, Dhaka A.
europepmc +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Prevalence and Distribution of Mental Disorders at Inpatient Psychiatry Service of a Large Military Hospital in Ukraine. [PDF]
Druz O +6 more
europepmc +1 more source
Ethics of cyberwar attacks / Chapter in Cyber War and Cyber Terrorism
Neil C. Rowe
openalex +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Potentially traumatising events and post-traumatic stress symptoms of adolescents in out-of-home care. [PDF]
Hummel C +5 more
europepmc +1 more source
From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia +3 more
wiley +1 more source
Secure command transmission techniques for industrial remote control. [PDF]
Abu Al-Hija'a A, Andó M, Szekeres BJ.
europepmc +1 more source

