Results 71 to 80 of about 357,414 (246)
A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg +5 more
wiley +1 more source
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu +3 more
doaj +1 more source
Benchmarking Attacks on Learning with Errors
Accepted at Oakland S&P ...
Wenger, Emily +4 more
openaire +2 more sources
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt +8 more
wiley +1 more source
ERRORS IN THE CLASSROOM: DILEMMAS AND PRACTICES
Human learning is fundamentally a process that involves the making of errors. But the issue of error and how errors are treated in the classroom is still dilemma for many teachers.
Taslimah Retno Marpinjun
doaj +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
On the independence heuristic in the dual attack
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj +1 more source
Chronic cannabis use and error awareness: The effect on learning from errors. [PDF]
Dali G, Poulton A, Hester R.
europepmc +1 more source
Recent Progress in Oxide‐Based Na‐Ion Conductors
Recent advances in oxide‐based sodium‐ion conductors are reviewed, focusing on β/β″‐alumina, NASICON‐type compounds, and Na5YSi4O12‐type (N5) silicates, together with emerging perovskite and layered oxides. Improvements in ionic conductivity, compositional tuning, and processing are highlighted.
Bowei Xun +3 more
wiley +1 more source
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco +2 more
doaj +1 more source

