Results 51 to 60 of about 45,445 (284)

ADS-B Crowd-Sensor Network and Two-Step Kalman Filter for GNSS and ADS-B Cyber-Attack Detection

open access: yesSensors, 2021
Automatic Dependent Surveillance-Broadcast is an Air Traffic Control system in which aircraft transmit their own information (identity, position, velocity, etc.) to ground sensors for surveillance purposes. This system has many advantages compared to the
Mauro Leonardi, Gheorghe Sirbu
doaj   +1 more source

Tissue Engineered Human Elastic Cartilage From Primary Auricular Chondrocytes for Ear Reconstruction

open access: yesAdvanced Functional Materials, EarlyView.
Despite over three decades of research, no tissue‐engineered solution for auricular reconstruction in microtia patients has reached clinical translation. The key challenge lies in generating functional elastic cartilage ex vivo. Here, we integrate synergistic cell‐biomaterial strategies to engineer auricular grafts with mechanical and histological ...
Philipp Fisch   +13 more
wiley   +1 more source

Voltage regulation strategy for alternating current microgrid under false data injection attacks [PDF]

open access: yesArchives of Electrical Engineering
This study introduces a robust strategy for regulating output voltage in the presence of false data injection (FDI) attacks. Employing a hierarchical approach, we disentangle the distributed secondary control problem into two distinct facets: an observer-
Rongqiang Guan   +5 more
doaj   +1 more source

Electro‐Stimulated Graphene‐Polymer Nanocomposites Enable Wearable Patches With Feedback‐Controlled Drug Release

open access: yesAdvanced Healthcare Materials, EarlyView.
xx xx. ABSTRACT Stimuli‐responsive nanomaterials capable of spatiotemporal control over drug release are of nanocomposite patch (“e‐Medi‐Patch”) engineered from biodegradable polycaprolactone (PCL), graphene nanoplatelets, and a redox‐active therapeutic, niclosamide. The hierarchical composite integrates π‐π interactions between aromatic drug molecules
Santosh K. Misra   +7 more
wiley   +1 more source

Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective

open access: yes, 2014
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex   +3 more
core   +1 more source

Transistor‐Level Activation Functions via Two‐Gate Designs: From Analog Sigmoid and Gaussian Control to Real‐Time Hardware Demonstrations

open access: yesAdvanced Materials, EarlyView.
Screen gate‐based transistors are presented, enabling tunable analog sigmoid and Gaussian activations. The SA‐transistor improves MRI classification accuracy, while the GA‐transistor supports precise Gaussian kernel tuning for forecasting. Both functions are implemented in a single device, offering compact, energy‐efficient analog AI processing ...
Junhyung Cho   +9 more
wiley   +1 more source

Analyzing Attacks on Cooperative Adaptive Cruise Control (CACC)

open access: yes, 2017
Cooperative Adaptive Cruise Control (CACC) is one of the driving applications of vehicular ad-hoc networks (VANETs) and promises to bring more efficient and faster transportation through cooperative behavior between vehicles.
Kargl, Frank   +2 more
core   +1 more source

Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics

open access: yesAdvanced Materials, EarlyView.
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón   +6 more
wiley   +1 more source

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

De Rerum Natura: How Do Halide Perovskites Self‐Heal From Damage?

open access: yesAdvanced Materials, EarlyView.
How can lead‐halide‐perovskites self‐heal after damage from light, heat, mechanical strain, or radiation? We show that reversible chemical defects underly performance losses and recovery, highlighting the roles of halide and proton migration, redox‐driven reactions, and acid‐base equilibria.
Davide Raffaele Ceratti   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy