Download full-text PDF

Source
http://dx.doi.org/10.1136/bmj.r371DOI Listing

Publication Analysis

Top Keywords

false allegations
4
allegations colleague
4
colleague struck
4
false
1
colleague
1
struck
1

Similar Publications

Animals often eavesdrop on other species' alarm calls to gain information about danger, but this can allow for deception by callers. Such deception often uses 'aerial' alarm calls, which normally warn of airborne predators and prompt immediate fleeing. The calls are deceptive if they are given when no flying predator is present and the caller benefits from the victim's response, typically by gaining food dropped when the listener flees.

View Article and Find Full Text PDF

Patients addicted to prescription opiates have found innovative ways to reliably obtain their desired prescription opiates at a time when such prescriptions are restricted due to the opioid crisis. Instead of turning to the black market, some patients deceive their health care providers and malinger to create or enhance severe chronic pain conditions that require medically necessary treatment with prescription opiates. Such sophisticated narcotic-seeking patients set up situations by which they become severely and chronically injured through natural or iatrogenic means.

View Article and Find Full Text PDF

Purpose: Social robots are a promising assistive technology to support older adults in home and healthcare environments. Engaging end-users in all stages of social robot research, development, and deployment is critical to adoption. However, the voices of end-users are missing from policies about social robots.

View Article and Find Full Text PDF

This article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception attack (DA) strategy is proposed, which utilizes the information of quantized output to assess the importance degree of transmission signals. Furthermore, in order to conserve the limited energy of the adversary, the independent attack strategies are designed for different sensors.

View Article and Find Full Text PDF

This article presents several adaptive event-triggered control (ETC) strategies for a class of uncertain nonlinear cyber-physical systems (CPSs) under constant or time-varying full-state constraints, as well as deception attacks via the senior network. Initially, the system under investigation is reformulated into a new system that encompasses both the original system state and the compromised state, enabling the use of compromised states for feedback control. Subsequently, two innovative asymptotic integral barrier Lyapunov functions (IBLFs) are developed by directly imposing constraints on the compromised state, thereby eliminating the necessity to convert state constraints into error constraints as required by traditional BLFs-based methods.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!