Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1136/bmj.r371 | DOI Listing |
Biol Lett
March 2025
Research School of Biology, Australian National University, Canberra, Australian Capital Territory, Australia.
Animals often eavesdrop on other species' alarm calls to gain information about danger, but this can allow for deception by callers. Such deception often uses 'aerial' alarm calls, which normally warn of airborne predators and prompt immediate fleeing. The calls are deceptive if they are given when no flying predator is present and the caller benefits from the victim's response, typically by gaining food dropped when the listener flees.
View Article and Find Full Text PDFPatients addicted to prescription opiates have found innovative ways to reliably obtain their desired prescription opiates at a time when such prescriptions are restricted due to the opioid crisis. Instead of turning to the black market, some patients deceive their health care providers and malinger to create or enhance severe chronic pain conditions that require medically necessary treatment with prescription opiates. Such sophisticated narcotic-seeking patients set up situations by which they become severely and chronically injured through natural or iatrogenic means.
View Article and Find Full Text PDFDisabil Rehabil Assist Technol
March 2025
Department of Medicine, Division of Neurology, The University of British Columbia, Vancouver, Canada.
Purpose: Social robots are a promising assistive technology to support older adults in home and healthcare environments. Engaging end-users in all stages of social robot research, development, and deployment is critical to adoption. However, the voices of end-users are missing from policies about social robots.
View Article and Find Full Text PDFThis article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception attack (DA) strategy is proposed, which utilizes the information of quantized output to assess the importance degree of transmission signals. Furthermore, in order to conserve the limited energy of the adversary, the independent attack strategies are designed for different sensors.
View Article and Find Full Text PDFThis article presents several adaptive event-triggered control (ETC) strategies for a class of uncertain nonlinear cyber-physical systems (CPSs) under constant or time-varying full-state constraints, as well as deception attacks via the senior network. Initially, the system under investigation is reformulated into a new system that encompasses both the original system state and the compromised state, enabling the use of compromised states for feedback control. Subsequently, two innovative asymptotic integral barrier Lyapunov functions (IBLFs) are developed by directly imposing constraints on the compromised state, thereby eliminating the necessity to convert state constraints into error constraints as required by traditional BLFs-based methods.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!