networked controlsystems are feedback controlsystems with system components distributed at different locations connected through a communication network. Since the communication network is carried out through the in...
详细信息
ISBN:
(纸本)9781665489188
networked controlsystems are feedback controlsystems with system components distributed at different locations connected through a communication network. Since the communication network is carried out through the internet and there are bandwidth and packet size limitations, network constraints appear. Some of these constraints are time delay and packet loss. These network limitations can degrade the performance and even destabilize the system. To overcome the adverse effect of these communication constraints, various approaches have been developed, among which a representative one is networked predictive control. This approach proposes a controller, which compensates for the network time delay and packet loss actively. This paper aims at implementing a networked predictive control system for controlling a robot arm through a computer network. The network delay is accounted for by a predictor, while the potential of packet loss is mitigated using redundant control packets. The results will show the stability of the system despite a high delay and a considerable packet loss. Additionally, improvements to previous networked predictive controlsystems will be suggested and an increase in performance can be shown. Lastly, the effects of different system and environment parameters on the control loop will be investigated.
This article investigates the use of artificial intelligence, particularly artificial neural networks (ANNs), to enhance road safety by refining lateral stability and trajectory tracking in autonomous driving systems....
详细信息
Industrial internet of Things (iioT) systems are subject to intrusion attacks that may cause devastating damage. However, common security mechanisms may not be applicable as iioT systems and standard IT networks are f...
详细信息
Critical infrastructure cyberattacks have become a significant threat to national security worldwide. Adversaries exploit vulnerabilities in communication networks, technologies, and protocols of smart grid control sy...
详细信息
ISBN:
(纸本)9783031576386;9783031576393
Critical infrastructure cyberattacks have become a significant threat to national security worldwide. Adversaries exploit vulnerabilities in communication networks, technologies, and protocols of smart grid controlsystemsnetwork to gain access and control of power grids, causing blackouts. Despite the need to safeguard the reliable and stable operation of the grid against cyberattacks, simultaneously detecting and preventing attacks presents a significant challenge. To address this, a Kali Linux machine was connected to a smart grid control system network emulated in GNS3 to perform common cyberattacks. Wireshark was then deployed to capture network traffic for machine learning. Aiming to improve the detection and prevention of cyberattacks the study proposed a dual-tasked ensemble supervised machine learning model, a combination of Neural network and Extreme Gradient Boosting, that had an average accuracy of 99.60% and detection rate of 99.48%. The first task of the model distinguishes between normal state and cyberattack modes of operation. The second task prevents suspicious packets from reaching the network destination devices. Leveraging the PowerShell Script, the model dynamically applies packet filtering firewall rules based on its predictions. The proposed model was tested on new data, producing an accuracy of 99.19% and a detection rate of 98.95%. Furthermore, the model's performance was compared to existing proposed cyberattack detection models. Thus, the proposed model, with its function as a firewall, enhances the overall security capabilities of the smart grid and significantly mitigates potential cyberattacks.
Urban traffic congestion is an increasingly pressing issue and advanced solutions like intelligent traffic controlsystems are becoming unavoidable. This paper explores the application of reinforcement learning to enh...
详细信息
ISBN:
(纸本)9783031708183;9783031708190
Urban traffic congestion is an increasingly pressing issue and advanced solutions like intelligent traffic controlsystems are becoming unavoidable. This paper explores the application of reinforcement learning to enhance traffic flow and reduce congestion. Our goal was to develop a reinforcement learning-based model that adapts to varying traffic conditions in real-time. Several methods are available for the real-time optimization of traffic, ranging from analytical methods to more flexible metaheuristic methods and reinforcement learning-based solutions. Each method lacks either adaptivity or scalability, or the completeness of the global optimization, or the performance requirement is too high. Based on the different requirements it is clearly a challenging task. The focus of our research is on the scalability, and computational efficiency of the model by using a method of sharing information that is similar to a cellular network. Our solution is not just easy to scale but also able to search for the global optimum with a low computational cost. A general model was trained to achieve out-of-the-box usage capability. The controlnetwork also can be finetuned for better performance. Our comprehensive analysis showed that smart traffic lights significantly enhance the efficiency of traffic systems, boasting improvements ranging from 10% to 80% compared to traditional and other reinforcement learning-based solutions. These intelligent controllers not only reduce waiting times but also contribute to environmental protection by reducing the carbon footprint.
In IoT Security risks are, however, presented to devices and services by this integration. To give machine learning (ML) credit for being a novel approach, this paper surveys Intrusion Detection systems (IDS) for the ...
详细信息
The internet of Things (IoT) necessitates robust access control mechanisms to secure a vast array of interconnected devices. We adopt the blockchain based decentralized access control approach and identify the gaps in...
详细信息
mdx ii is an Infrastructure-as-a-Service (IaaS) cloud platform designed to accelerate data science research and foster cross-disciplinary collaborations among universities and research institutions in Japan. Unlike tr...
详细信息
The internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects, enabling high levels of connectivity between them. As the IoT networks grow and expand,...
详细信息
ISBN:
(纸本)9783031708183;9783031708190
The internet of Things (IoT) has been introduced as a breakthrough technology that integrates intelligence into everyday objects, enabling high levels of connectivity between them. As the IoT networks grow and expand, they become more susceptible to cybersecurity attacks. A significant challenge in current intrusion detection systems for IoT includes handling imbalanced datasets where labeled data are scarce, particularly for new and rare types of cyber attacks. Existing literature often fails to detect such underrepresented attack classes. This paper introduces a novel intrusion detection approach designed to address these challenges. By integrating Self Supervised Learning (SSL), Few Shot Learning (FSL), and Random Forest (RF), our approach excels in learning from limited and imbalanced data and enhancing detection capabilities. The approach starts with a Deep Infomax model trained to extract key features from the dataset. These features are then fed into a prototypical network to generate discriminate embedding. Subsequently, an RF classifier is employed to detect and classify potential malware, including a range of attacks that are frequently observed in IoT networks. The proposed approach was evaluated through two different datasets, MaleVis and WSN-DS, which demonstrate its superior performance with accuracies of 98.60% and 99.56%, precisions of 98.79% and 99.56%, recalls of 98.60% and 99.56%, and F1-scores of 98.63% and 99.56%, respectively.
In this research article, two methods suitable for remote monitoring and control of battery management system (BMS), respectively are proposed. The methods use controller area network (CAN) communication and internet ...
详细信息
暂无评论