Diffusion mechanism design, which investigates how to incentivise agents to invite as many colleagues to a multi-agent decision making process as possible, is a new research paradigm at the intersection between microe...
详细信息
the paper explores a high-precision positioning system of offshore wind turbine installation vessels (OWTIVs). A finite-time disturbance observer (FTDO) is developed to assess the multi-source disturbances that actual...
详细信息
Withthe continuous development of soccer robot technology, target tracking control has become one of its core technologies. Traditional target tracking methods often exhibit poor robustness and flexibility when facin...
详细信息
Naval vessels are complex systems operating under stress and critical conditions. the interdependencies among the ship systems make the optimal paths to repair to be not obvious. the Infrastructures Interdependencies ...
详细信息
Early identification of plant diseases plays an important role in reducing the financial losses for farmers and enhancing the productivity and quality of crops. the present work proposes five machine learning (ML) alg...
详细信息
Blockchain technology is a popular solution for secure transactions in untrusted networks. However, withthe growing number of blockchain applications, how to ensure the security of the blockchain system itself has be...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
Blockchain technology is a popular solution for secure transactions in untrusted networks. However, withthe growing number of blockchain applications, how to ensure the security of the blockchain system itself has become an urgent problem. In this paper, we propose a novel security-testing framework for blockchain systems based on a vulnerability-detection model. Our study involves an analysis and comparison with existing software-vulnerability analysis methods. Our framework first addresses each factor that impacts the security of the blockchain system, with a vulnerability attack graph being constructed using model-checking to describe the complete exploitation process of system vulnerabilities. Reliability theory is used to quantitatively assess the vulnerability attack graph of the blockchain system, thereby providing a theoretical basis for evaluating its security. Finally, we verify the effectiveness and feasibility of the proposed security-testing framework for blockchain systems on an e-voting election blockchain system. the results from our extensive experiments show that our proposed method outperforms other formal-verification-based methods for detecting blockchain vulnerabilities, and also provides a scientific and reliable assessment of blockchain system security.
European Rail Traffic Management System (ERTMS) is a standard for the train control and signalling system whose application is spreading throughout Europe. the ETCS (European Train control System) level 3 is attractin...
详细信息
ISBN:
(纸本)9783031664557;9783031664564
European Rail Traffic Management System (ERTMS) is a standard for the train control and signalling system whose application is spreading throughout Europe. the ETCS (European Train control System) level 3 is attracting experts because it is still in the design phase. Many works provide formal models to the verification of ERTMS/ETCS using formal methods, but they did not investigate the validation problem. To deal withthis challenge we propose an iterative formal modeldriven approach that helps validating step-by-step a real formal specification of ERTMS/ETCS hybrid level 3. Our approach introduces Domain-Specific Languages (DSLs) to help system experts understand existing specifications that are already proven. To this purpose we extend and apply Meeduse, the only existing language workbench today that allows embedding formal semantics within DSLs. the paper presents this application and discusses the lessons learned from the railway and formal method experts' points of view.
In this paper, a controller based on a soft computing technique, specifically fuzzy logic, is presented and applied to a wind turbine. In the case of floating offshore wind turbines (FOWT), environmental disturbances,...
详细信息
the autonomous anti-sway control of the ship-mounted crane systems is a tough issue due to the under-actuated characteristic, strong coupling and base excitation. Furthermore, the ship-mounted crane systems are also s...
详细信息
ISBN:
(纸本)9789819770007;9789819770014
the autonomous anti-sway control of the ship-mounted crane systems is a tough issue due to the under-actuated characteristic, strong coupling and base excitation. Furthermore, the ship-mounted crane systems are also suffering from unknown dynamics and frictions etc. In some conditions, the ship-mounted cranes may exhibit spherical pendulum effects. these factors make the control problem even more challenging. To solve the above problems, this paper designed a Radical Basis Function Neural Network (RBFNN) based feedback control method for a 5-DOF ship-mounted rotary crane. Specially, the adaptive RBFNN is established to approximate the unknown dynamics online. After that, eschewing any simplification of the dynamic model, a feedback anti-sway control is designed to ensure the cargo could reach to desired position and dampening the payload spherical swing simultaneously. the closed-loop stability is analyzed and the effectiveness of the control method is validated via simulation experiment results.
We formulate intrusion tolerance for a system with service replicas as a two-level game: a local game models intrusion recovery and a global game models replication control. For both games, we prove the existence of e...
详细信息
ISBN:
(纸本)9783031748349;9783031748356
We formulate intrusion tolerance for a system with service replicas as a two-level game: a local game models intrusion recovery and a global game models replication control. For both games, we prove the existence of equilibria and show that the best responses have a threshold structure, which enables efficient computation of strategies. State-of-the-art intrusion-tolerant systems can be understood as instantiations of our game with heuristic control strategies. Our analysis shows the conditions under which such heuristics can be significantly improved through game-theoretic reasoning. this reasoning allows us to derive the optimal control strategies and evaluate them against 10 types of network intrusions on a testbed. the testbed results demonstrate that our game-theoretic strategies can significantly improve service availability and reduce the operational cost of state-of-the-art intrusion-tolerant systems. In addition, our game strategies can ensure any chosen level of service availability and time-to-recovery, bridging the gap between theoretical and operational performance.
暂无评论