LEADER 00960nam0-22002891i-450- 001 990004022860403321 005 19990530 035 $a000402286 035 $aFED01000402286 035 $a(Aleph)000402286FED01 035 $a000402286 100 $a19990530d1981----km-y0itay50------ba 101 0 $aspa 105 $ay---e---00--- 200 1 $aALFONSO X re di Castiglia e di Leon "Lapidario".$e(segun el manuscrito escurialense H.I.15)$fIntrod., ed., notas y vocabulario de Sagrario Rodriguez M.Montalvo$gPrologo de Rafael Lapesa 210 $aMadrid$cEd.Gredos$d1981 215 $a333 p.$d25 cm 225 1 $aBibl. Romanica Hispanica$v4 702 1$aLapesa,$bRafael$f<1908-2001> 702 1$aMontalvo,$bSagrario Rodriguez M. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004022860403321 952 $aB 3404$b60743$fFLFBC 959 $aFLFBC 996 $aALFONSO X re di Castiglia e di Leon "Lapidario"$9470380 997 $aUNINA LEADER 06865nam 22004693 450 001 9910506405603321 005 20211214151302.0 010 $a3-030-88350-7 035 $a(CKB)4950000000280202 035 $a(MiAaPQ)EBC6787293 035 $a(Au-PeEL)EBL6787293 035 $a(OCoLC)1285172248 035 $a(EXLCZ)994950000000280202 100 $a20211214d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Cyber-Physical Systems 210 1$aCham :$cSpringer International Publishing AG,$d2021. 210 4$dİ2022. 215 $a1 online resource (293 pages) 225 1 $aStudies in Systems, Decision and Control Ser. ;$vv.396 311 $a3-030-88349-3 327 $aIntro -- Preface -- Acknowledgements -- Contents -- Notations and Acronyms -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Current Research on Securing CPSs -- 1.1.1 Advances in Detecting Attacks -- 1.1.2 Advances in Securing CPSs Under DoS Attacks -- 1.1.3 Advances in Securing CPSs Under Deception Attacks -- 1.2 Publication Contribution -- 1.3 Publication Outline -- Part I Secure Estimation and Control for CPSs Under DoS Attacks -- 2 Optimal DoS Attack Scheduling for CPSs -- 2.1 Introduction -- 2.2 System Formulation and Preliminaries -- 2.2.1 Physical Process Description -- 2.2.2 SINR-Based Communication Model -- 2.3 Remote Estimator Design -- 2.4 Attack Sequence Design and Energy Allocation -- 2.5 Simulation Results -- 2.6 Conclusion -- 3 Active Defense Control of CPSs via Sliding Mode -- 3.1 Introduction -- 3.2 System Formulation and Preliminaries -- 3.2.1 Physical Process Description -- 3.2.2 DoS Attack -- 3.3 Resilient Sliding Mode Control Design -- 3.3.1 Estimator Design -- 3.3.2 Sliding Mode Approach -- 3.3.3 Stability Analysis -- 3.3.4 Resilient Sliding Mode Controller Design -- 3.4 Active Defense-Based Resilient Control -- 3.4.1 Optimal Defense Strategy -- 3.4.2 Defense Scheme-Based Estimator -- 3.4.3 Sliding Dynamics Analysis -- 3.4.4 Resilient Sliding Mode Control Design with Defense Strategy -- 3.5 Conclusion -- 4 Learning Tracking Control for CPSs -- 4.1 Introduction -- 4.2 System Formulation and Preliminaries -- 4.2.1 Physical Process and Reference Model Descriptions -- 4.2.2 SINR-Based Communication Model -- 4.2.3 Control Objective -- 4.3 Optimal Tracking Controller Design and Stability Analysis -- 4.3.1 Analysis of the Value Function -- 4.3.2 Optimal Tracking Controller Design -- 4.3.3 Analysis of the Solution to the Riccati Equation -- 4.4 Q-Learning Optimal Tracking Scheme Design. 327 $a4.4.1 Convergence Analysis of Algorithm -- 4.5 Off-Policy Learning Control Algorithm -- 4.5.1 Model-Based Off-Policy Learning Control Scheme -- 4.5.2 Model-Free Off-Policy Learning Control Scheme -- 4.6 Conclusion -- 5 Intelligent Control for Nonlinear Networked Control Systems -- 5.1 Introduction -- 5.2 Problem Formulation -- 5.2.1 System Description -- 5.2.2 Fuzzy Logic Systems -- 5.3 Adaptive Control Design -- 5.4 Simulation Results -- 5.5 Conclusion -- 6 Reliable Filtering of Sensor Networks -- 6.1 Introduction -- 6.2 Problem Formulation -- 6.2.1 IT-2T-S Fuzzy Model -- 6.2.2 Failure Model -- 6.2.3 IT2 Fuzzy Reliable Distributed Filter Design -- 6.2.4 Filtering Error System -- 6.3 Main Results -- 6.4 Simulation Results -- 6.5 Conclusion -- Part II Secure Estimation and Control for CPSs Under False Data Injection Attacks -- 7 Secure Estimation for CPSs via Sliding Mode -- 7.1 Introduction -- 7.2 Problem Formulation -- 7.2.1 CPSs Model -- 7.2.2 CPSs Model in Descriptor Form -- 7.2.3 Minimization Optimal Problem -- 7.2.4 Sliding Mode Observer -- 7.3 Secure Estimation Algorithm Design -- 7.3.1 Projection Operator -- 7.3.2 Sliding Mode Observer Secure Estimation Algorithm -- 7.4 Convergence Analysis of Algorithm 1 -- 7.4.1 Analysis for Time Update -- 7.4.2 Analysis for Projection Operator -- 7.4.3 Analysis for Estimation Update -- 7.4.4 Analysis for Terminated Conditions of Inner Loop -- 7.4.5 Analysis of Sliding Mode Error Rejection Term Design -- 7.5 Simulation Results -- 7.6 Conclusion -- 8 Zero-Sum Game Based Optimal Secure Control -- 8.1 Introduction -- 8.2 Problem Formulation -- 8.2.1 Physical Process Description -- 8.2.2 Actuator Attack -- 8.3 Main Results -- 8.3.1 Optimal Estimator Design -- 8.3.2 Zero-Sum Game Based Optimal Policies Design -- 8.3.3 Convergence of the Scheme -- 8.4 Extended Work -- 8.5 Simulation Results -- 8.6 Conclusion. 327 $a9 Proactive Secure Control for CPSs -- 9.1 Introduction -- 9.2 System Formulation and Preliminaries -- 9.2.1 Physical Process: A Switching System Representation -- 9.2.2 The Closed-Loop System Under Attacks -- 9.3 Moving Target Defense Control Scheme -- 9.3.1 Controller and Moving Target Defense Design -- 9.3.2 Stability Analysis -- 9.4 Attack Detection and Isolation -- 9.4.1 Attack Detection Observer Design -- 9.4.2 Attack Isolation Scheme -- 9.5 Moving Target Defense Control Design -- 9.5.1 Reinforcement Learning Based Reactive Control Scheme -- 9.5.2 Moving Target Defense Design -- 9.6 Simulation Results -- 9.7 Conclusion -- 10 Fault-Tolerant Tracking Control for Nonstrict-Feedback Systems -- 10.1 Introduction -- 10.2 System Description and Preliminaries -- 10.2.1 Nonstrict-Feedback System -- 10.2.2 Fault Model -- 10.2.3 Control Objective -- 10.2.4 Neural Networks -- 10.2.5 Observer Design -- 10.3 Observer-Based Adaptive Fault-Tolerant Control Design -- 10.4 Simulation Results -- 10.5 Conclusion -- 11 Deep Reinforcement Learning Control Approach to Mitigating Attacks -- 11.1 Introduction -- 11.2 System Formulation and Preliminaries -- 11.2.1 Physical System Description -- 11.2.2 CPSs Under Cyber Attacks -- 11.3 Deep Reinforcement Learning Based Secure Controller Design and Implementation -- 11.3.1 Markov Decision Process -- 11.3.2 Reinforcement Learning Algorithm -- 11.3.3 Deep Neural Networks Approximation -- 11.3.4 Implementation of Lyapupnov-Based Soft Actor-Critic Deep Reinforcement Learning Control Algorithm -- 11.4 Convergence and Stability Analysis -- 11.4.1 Algorithm Convergence Analysis -- 11.4.2 Data-Based Stability Analysis -- 11.5 Simulation Results -- 11.6 Conclusion -- 12 Conclusion and Further Work -- 12.1 Conclusion -- 12.2 Further Work -- Appendix References. 410 0$aStudies in Systems, Decision and Control Ser. 517 $aSecurity of Cyber-Physical Systems 608 $aElectronic books. 700 $aWu$b Chengwei 701 $aYao$b Weiran$01073748 701 $aSun$b Guanghui$01073749 701 $aWu$b Ligang$0720603 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910506405603321 996 $aSecurity of Cyber-Physical Systems$92569909 997 $aUNINA LEADER 01370cam0-22003491i-450 001 990005352950403321 005 20240923144437.0 035 $a000535295 100 $a19990604d1903----km-y0itay50------ba 101 0 $agre$alat 102 $aDE 105 $ay-------001yy 200 1 $aGraeciae descriptio$fPausaniae$grecognovit Fridericus Spiro 210 $aLipsia$cTeubner$d1903 215 $a3 vol.$d18 cm 225 1 $aBiblioteca scriptorum Graecorum et Romanorum teubneriana 327 1 $a1.: Libros I-IV continens$a2.: Libros V-VIII continens$a3.: Libros IX et X et indicem continens 676 $a880.01 700 1$aPausanias$c$0163943 702 1$aSpiro,$bFriedrich 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005352950403321 952 $aP2B-600-TEUB-PAUS.-401A(1)-1903$bBibl. 10240$fFLFBC$m10-27935 952 $aP2B-600-TEUB-PAUS.-401A(2)-1903$bBibl. 10240$fFLFBC$m10-27837 952 $aP2B-600-TEUB-PAUS.-401A(3)-1903$bBibl. s.n.$fFLFBC$m10-27936 952 $aP2B-600-TEUB-PAUS.-401A(1bis)-1903$bIst.Archeol. 14424$fFLFBC$mBRAU-13756 952 $aP2B-600-TEUB-PAUS.-401A(2bis)-1903$bIst.Archeol. 14424$fFLFBC$mBRAU-13757 952 $aP2B-600-TEUB-PAUS.-401A(3bis)-1903$bIst.Archeol. 14424$fFLFBC$mBRAU-13758 959 $aFLFBC 996 $aGraeciae descriptio$9591691 997 $aUNINA LEADER 03789nam 2201033z- 450 001 9910619466103321 005 20221025 010 $a3-0365-5268-5 035 $a(CKB)5670000000391613 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/93207 035 $a(oapen)doab93207 035 $a(EXLCZ)995670000000391613 100 $a20202210d2022 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aActive Materials for Medical Applications 210 $cMDPI - Multidisciplinary Digital Publishing Institute$d2022 215 $a1 online resource (158 p.) 311 08$a3-0365-5267-7 330 $aThis Special Issue was proposed by and for engineers, physicists, medical doctors, researchers and scientists. We intend to analyze and discuss different topics on special materials for medical applications. There is great potential in the application of active or smart materials (metallic, polymer or ceramic) for the progression of applications in the medical domain of MEMS, actuators, sensors or functional systems. Active or "smart" materials have the ability to respond to different physical or chemical stimuli in a specific, repeatable mode. The actual activity in the domain, however, presents problems connected to obtaining, processing, characterizing, modeling and simulating or prototyping technologies. This Special Issue focuses on the most recent advances in obtaining and thermal and mechanical processing active materials used in the medical field with enhanced performances. 606 $aHistory of engineering and technology$2bicssc 606 $aMaterials science$2bicssc 606 $aTechnology: general issues$2bicssc 610 $a3D printing 610 $aalkyl structure 610 $aatomic force microscope 610 $abeta-titanium wire 610 $abiodegradable 610 $abodily movement 610 $acadaver 610 $aCo-Cr-W 610 $acorrosion 610 $acurcuminoid-silanol films 610 $ademetoxilation 610 $adental bridges 610 $adental materials 610 $adroplet adhesion 610 $aear canal 610 $aear speculum 610 $aEDS 610 $aEDS elemental mapping 610 $aelectrochemical evaluation 610 $aelectrophoresis 610 $aendoscopy 610 $aFEMM 610 $afinite element analysis 610 $aHA 610 $ahealthy and reduced periodontium 610 $ahemp composite 610 $ain vitro test 610 $ainlays 610 $aLIF 610 $amagnetic abrasive finishing 610 $amandibular anterior teeth 610 $aMg-Ca-Gd alloys 610 $amicrohardness 610 $amicroscratch 610 $amicrostructure 610 $amulti-feed movement 610 $an/a 610 $aorthodontics 610 $aPLD 610 $aprofilometry 610 $ascratch test 610 $aself-expandable metallic stent 610 $aSEM 610 $aSEM-EDS 610 $askin barrier function 610 $askin permeability 610 $asurface roughness 610 $asurfactant 610 $aTi4Al4Zr 610 $atransdermal patch 610 $aturmeric 610 $aZn 615 7$aHistory of engineering and technology 615 7$aMaterials science 615 7$aTechnology: general issues 700 $aCimpoesu$b Nicanor$4edt$01315241 702 $aCimpoesu$b Ramona$4edt 702 $aCimpoesu$b Nicanor$4oth 702 $aCimpoesu$b Ramona$4oth 906 $aBOOK 912 $a9910619466103321 996 $aActive Materials for Medical Applications$93032288 997 $aUNINA