Aiming to enhance the comprehensive performance of the distributed common grounding DC electrode, reduce the construction cost, and solve the problem of optimizing the topology of distributed common DC grounding elect...
详细信息
Virtual sensors model the sensing operation of physical sensors deployed in an area of interest by generating sensory data with accuracy and precision close to those collected by physical sensors. their use in applica...
详细信息
ISBN:
(纸本)9781665495127
Virtual sensors model the sensing operation of physical sensors deployed in an area of interest by generating sensory data with accuracy and precision close to those collected by physical sensors. their use in applications such as augmenting the infrastructure of IoT facilities and test beds, monitoring and calibrating the operation of physical sensors, and developing Digital Twins of physical systems have led virtual sensors to attract research attention. Machine learning provides methods for modelling patterns in complex and big data generated by IoT sensing devices, allowing to model the behaviour of these devices. In this work, we investigate ML methods as means of implementation for virtual sensors. In particular, we evaluate the performance of six ML methods in terms of their effectiveness, accuracy and precision in generating sensory data based on data from physical sensors. In our study, we use a multi-modal dataset comprising IoT sensory data for temperature, humidity and illumination collected over a period of two years in an office space at University of Geneva. Our results show that the best performing model at predicting an output of a missing sensor is the Random Forest method, achieving MAPE error below 3%, 5% and 18% respectively for temperature, humidity and illuminance. the worst performing models were the linear radial basis function neural network and linear regression. In future research, we plan to deploy the best performing models natively on IoT devices, making use of tinyML and extreme edge computing methods.
this paper focuses on analyzing the issue of achieving asymptotic consensus in second-order multi-agent systems. the research introduces a novel dynamic sliding mode control technique that ensures the sliding surface ...
详细信息
To address the limitations of piezoelectric accelerometers in measuring low-frequency vibrations under high-voltage conditions, this paper introduces a fiber optic accelerometer vibration sensor based on the Fiber Opt...
详细信息
Due to dynamic changes in the environment of underground coal mine (UCM), the mining area has become hazarodous that set down the miner lives in to high risk. therefore, there is a need of continuous monitoring the of...
详细信息
sensor network has become an important area of research and various new applications for remote sensing are expected to emerge. One of the promising applications is structural health monitoring of building or civil en...
详细信息
the centralized multi-channel narrowband ANC (CMNANC) system employed for noise reduction in a wide region is computationally complex. Moreover, the presence of frequency mismatches in the reference signal severely co...
详细信息
the highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer....
详细信息
ISBN:
(纸本)9781665495127
the highly beneficial contribution of intelligent systems in the industrial domain is undeniable. Automation, supervision, remote control, and fault reduction are some of the various advantages new technologies offer. A protocol demonstrating high utility in industrial settings, and specifically, in smart grids, is distributed Network Protocol 3 (DNP3), a multi-tier, application layer protocol. Notably, multiple industrial protocols are not as securely designed as expected, considering the highly critical operations occurring in their application domain. In this paper, we explore the internal vulnerabilities-by-design of DNP3, and proceed withthe implementation of the attacks discovered, demonstrated through 8 DNP3 attack scenarios. Finally, we design and demonstrate a Deep Neural Network (DNN)-based, multi-model Intrusion Detection systems (IDS), trained with our experimental network flow cyberattack dataset, and compare our solution with multiple machine learning algorithms used for classification. Our solution demonstrates a high efficiency in the classification of DNP3 cyberattacks, showing an accuracy of 99.0%.
In recent years, distributed optimization algorithms have been increasingly applied to solve the economic scheduling problem of power monitoring system(PMS) because of their advantages of high flexibility, robustness ...
详细信息
the proceedings contain 11 papers. the topics discussed include: a dynamic dictionary-based sparse reconstruction method for DOA estimation;method of weak communication signal detection and signal quality assessment a...
ISBN:
(纸本)9798400716171
the proceedings contain 11 papers. the topics discussed include: a dynamic dictionary-based sparse reconstruction method for DOA estimation;method of weak communication signal detection and signal quality assessment at low SNR;Non-coherent fusion detection method for distributed MIMO radar based on modified ordered statistics;wavelet based multiscale deep learning algorithms for arctic sea ice melting prediction;deception detection system with joint cross-attention;a transformer-based method for the registration of terahertz security images with visible light images;multi-resolution convolutional neural network for specific emitter identification;and EDV-HOP: enhanced distance vector hop localization for wireless sensor network.
暂无评论