This article proposes a new mesoscopic approach for controlling a platoon of vehicles under asynchronous sampled-data measurements and bounded disturbances. The proposed control law yields disturbance string stability (DSS) independently of the effect of sampling. The design is constructive and...
01a Articolo in rivista
-
-
The Incident Management (IM) process is one of the core activities for increasing the overall security level of organizations and better responding to cyber attacks. Different security frameworks (such as ITIL and ISO 27035) provide guidelines for designing and properly implementing an effective IM...
-
Cooperative action involves the simulation of actions and their co-representation by two or more people. This requires the involvement of two complex brain systems: the mirror neuron system (MNS) and the mentalizing system (MENT), both of critical importance for successful social interaction....
-
In the Internet of Things era, the Internet demands extremely high-speed communication and data transformation. To this end, the tactile Internet has been proposed as a medium that provides the sense of touch ability, facilitating data transferability with extra-low latency in various applications...
-
This article provides an overview of security and privacy challenges and concerns that come with modern browser application programming interfaces. We aim to inform the community about intrinsic risks associated with their usage and suggest possible directions to tackle them more effectively.
-
In the context of healthcare, an AI solution is generally developed for a specific analysis task, based on a relevant dataset, with little attention to reusability and generalizability of its data preparation step. This paper focuses on a different scenario, which can be called context-oriented,...
-
Artificial intelligence (AI) is anticipated to reshape the economy by revolutionizing human interaction with technology. Despite its significance, research endeavors in the field of economics remain relatively limited. In this editorial, we outline the articles featured in a Virtual Special Issue...
-
Incubators are reputed to be key institutions for the creation and growth of viable and successful entrepreneurial ventures. One mechanism through which their beneficial action should unfold is that incubatees could be more likely to stipulate alliances with third parties. We explore, both...
-
Purpose: Single-agent immune checkpoint inhibitor (IO) therapy is the standard for non-oncogene-addicted advanced non-small cell lung cancer (aNSCLC) with PD-L1 tumor proportion score ≥ 50%. Smoking-induced harm generates high tumor mutation burden (H-TMB) in smoking patients (S-pts), while never-...
-
Cyber-physical systems face cyberattacks that hinder performance, increase cost, or even collapse the system. Thus, rapid and accurate attack detection is crucial for quick activation of defense mechanisms. Model-based attack detection approaches are known for their precision; however, the...