These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 36517648)

  • 1. Current-state opacity verification in discrete event systems using an observer net.
    Labed A; Saadaoui I; Wu N; Yu J; Li Z
    Sci Rep; 2022 Dec; 12(1):21572. PubMed ID: 36517648
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Language-based Opacity Verification and Enforcement in the Framework of Labeled Petri Nets.
    Habbachi S; Li Z; Wu N; Khalgui M
    Sci Prog; 2022; 105(1):368504221075466. PubMed ID: 35196198
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On-line verification of initial-state opacity by Petri nets and integer linear programming.
    Cong X; Fanti MP; Mangini AM; Li Z
    ISA Trans; 2019 Oct; 93():108-114. PubMed ID: 30799022
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Verification of initial-and-final-state opacity for unambiguous weighted automata.
    Shen L; Miao S; Lai A; Komenda J
    ISA Trans; 2024 May; 148():237-246. PubMed ID: 38599927
    [TBL] [Abstract][Full Text] [Related]  

  • 5. On the verification of intransitive noninterference in mulitlevel security.
    Ben Hadj-Alouane N; Lafrance S; Lin F; Mullins J; Yeddes MM
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):948-58. PubMed ID: 16240770
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fault diagnosis for discrete events systems described by partially observed Petri nets.
    Arichi F; Cherki B; Djemai M; Djouadi SM
    ISA Trans; 2022 Sep; 128(Pt A):220-228. PubMed ID: 34602239
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.
    Mohsin AH; Zaidan AA; Zaidan BB; Albahri AS; Albahri OS; Alsalem MA; Mohammed KI
    J Med Syst; 2018 Oct; 42(12):238. PubMed ID: 30327939
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A State Space Approach to Decentralized Fault SE-Coprognosability of Partially Observed Discrete Event Systems.
    Zhou Y; Chen Z; Zhang Z; Ni Y; Liu Z
    IEEE Trans Cybern; 2023 Mar; 53(3):2028-2033. PubMed ID: 35476560
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Control synthesis of timed discrete event systems based on predicate invariance.
    Chen H; Hanisch HM
    IEEE Trans Syst Man Cybern B Cybern; 2000; 30(5):713-24. PubMed ID: 18252404
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Safety analysis of discrete event systems using a simplified Petri net controller.
    Zareiee M; Dideban A; Asghar Orouji A
    ISA Trans; 2014 Jan; 53(1):44-9. PubMed ID: 24074873
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Discrete event representation of qualitative models using Petri nets.
    Fanni A; Giua A
    IEEE Trans Syst Man Cybern B Cybern; 1998; 28(6):770-80. PubMed ID: 18255996
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A linkable identity privacy algorithm for HealthGrid.
    Zhang N; Rector A; Buchan I; Shi Q; Kalra D; Rogers J; Goble C; Walker S; Ingram D; Singleton P
    Stud Health Technol Inform; 2005; 112():234-45. PubMed ID: 15923732
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Modeling and control of operator functional state in a unified framework of fuzzy inference petri nets.
    Zhang JH; Xia JJ; Garibaldi JM; Groumpos PP; Wang RB
    Comput Methods Programs Biomed; 2017 Jun; 144():147-163. PubMed ID: 28494999
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A fine granularity based user collaboration algorithm for location privacy protection.
    Wang B; Zhang L; Zhang G
    PLoS One; 2019; 14(7):e0220278. PubMed ID: 31344097
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Model-based approach for cyber-physical attack detection in water distribution systems.
    Housh M; Ohar Z
    Water Res; 2018 Aug; 139():132-143. PubMed ID: 29635150
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
    Levshun D; Chechulin A; Kotenko I
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808558
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy.
    Upadhyay S; Kumar M; Kumar A; Karnati R; Mahommad GB; Althubiti SA; Alenezi F; Polat K
    Comput Math Methods Med; 2022; 2022():8717263. PubMed ID: 35924113
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Anomaly Detection in Discrete Manufacturing Systems by Pattern Relation Table Approaches.
    Sun X; Li R; Yuan Z
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33053690
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.