This paper considers the synchronization of reaction-diffusion complex-valued neural networks (RDCVNNs) based on event-triggered sampling iterative learning control (ET-SILC). An event-triggered control (ETC) method i...
详细信息
cyber-Physical systems (CPS) form the nation's critical infrastructure. The present-day CPS incorporate advanced communication technologies for remote monitoring and control. However, CPS often have infrastructure...
详细信息
ISBN:
(纸本)9798350323856
cyber-Physical systems (CPS) form the nation's critical infrastructure. The present-day CPS incorporate advanced communication technologies for remote monitoring and control. However, CPS often have infrastructures that have a very long lifespan. Consequently, the incorporation of cybersecurity in legacy systems is a challenge. This has led to an increased attack surface for CPS. Identifying risks and implementing security techniques during the design phase can help improve the security posture of CPS. This paper presents a holistic model-based risk assessment and mitigation framework for CPS to achieve security by design. Such a framework can also be applied to legacy systems to mitigate the risks.
Autonomous underwater vehicles (AUVs) must be able to track a particular trajectory when performing various tasks. Sometimes, the widely used control method in actual marine engineering, the proportional integral deri...
详细信息
ISBN:
(纸本)9798350311259
Autonomous underwater vehicles (AUVs) must be able to track a particular trajectory when performing various tasks. Sometimes, the widely used control method in actual marine engineering, the proportional integral derivative (PID) control method cannot meet the accuracy requirements of AUVs' trajectory tracking. In this paper, a dynamic surface sliding mode controller for trajectory tracking is designed. A nonlinear disturbance observer is used to compensate for environmental interference, and an improved particle swarm optimization with dynamic inertia weight is applied to optimize the control parameter. Simulation experiments are based on the mathematical model of an underwater robot BLUEROV2, and the control and optimization algorithms are designed.
The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In T...
详细信息
ISBN:
(纸本)9798331518882
The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In Transpiration 5.0, the critical infrastructure increasingly relies on automated systems, which enhances the threat of ransomware attacks, specifically targeting vital cyber-physical systems (CPS), smart grids, and intelligent transportation systems (ITS). The paper explores transportation ransomware attack data to incorporate advanced visualization and extract relevant data attributes for cyber risk evaluation. The study uses the NIST risk management framework and ISACA risk quantification to develop a cyber risk evaluation method. With the findings of the literature review, the research highlights ransomware as a significant threat to intelligent transportation systems (ITS), given the negative impact of malware on IoT, IIoT, and network-connected devices. While substantial research exists on malware detection techniques, performance, accuracy, and cloud-based strategies, it's crucial for organizations to comprehend the risks of ransomware attacks to implement effective security controls and enable cyber excellence. The research executes exploratory data analysis on the given dataset to find out the correlation between different attributes such as severity, data loss, affected systems, and ransom amount for evolving a risk method to evaluate cyber risk. The focus is to simplify the risk evaluation process by fitting the right data attributes into a standard risk management framework and risk formula for broader reusability. The method was applied to different transportation modes to calculate the risk scores respectively and generate insights accordingly. The overall analysis supports that effective risk predictions along with consistent monitoring can help to control ransomware attack incidents and improve cyber resiliency. This paper proposes a data-d
Machine controlsystems have undergone a significant transformation, transitioning from centralized computer numeric control to automatic control. One of the key challenges in this evolution stems from the complex and...
详细信息
ISBN:
(纸本)9798350362664;9798350362671
Machine controlsystems have undergone a significant transformation, transitioning from centralized computer numeric control to automatic control. One of the key challenges in this evolution stems from the complex and varied nature of many manufacturing systems, characterized by multiscale, Multiphysics, dynamic, and stochastic elements. This complexity has spurred numerous innovations at the convergence of artificial intelligence (AI), data analytics, and manufacturing sciences. Consequently, the question of how the manufacturing industry can leverage the technology flexibility available is addressed through the inherent adaptive capabilities of AI. This research aims to articulate and establish a process for imbuing flexibility into manufacturing processes, leveraging the technology of the manufacturing system with the integration of AI. The objective is to harness the adaptive potential of technology-based flexibility using AI, employing a combination of AI methods, mechanism-driven principles, and engineering technology. In this context, flexibility denotes a manufacturing process's ability to respond effectively to new system requirements, whether planned or unforeseen. The paper asserts that the value of system flexibility is an intrinsic advantage of manufacturing system technology. A qualitative research approach is employed to investigate and elucidate how the manufacturing system can be modeled to unlock its flexibility potential, utilizing Mechanistic AI applications.
Cardiac disease frequently manifests as circulatory conditions such as peripheral arterial disease (PAD). The sonographic of the arteries in the lower limbs is used in this work to propose a gentle technique for exami...
详细信息
ISBN:
(纸本)9798331540661;9798331540678
Cardiac disease frequently manifests as circulatory conditions such as peripheral arterial disease (PAD). The sonographic of the arteries in the lower limbs is used in this work to propose a gentle technique for examining PAD. The recommended method includes Otsu's thresholding to binaries spectral pictures, an extraction of important characteristics, and automatic identification made possible by a artificial intelligence model called neural network based predictor. The complete system is incorporated in a wrist-worn ultrasound (US) technology FPGA. Without compromising performance, the exponential domain-based approximation approach minimizes power usage and complicated design. In the analysis of 125 spectrum diagrams, the overall Success Rate in Distinguishing Binary Classes is determined to be 91.4%. The backwards-compatible design may be helpful for Near-bedside apps and constrained by resources platforms to interact with the US system in order to provide a cost-effective solution.
The power sector is one of the most essential infrastructures globally. Digital transformation is underway in the power sector, making it more vulnerable to cyberattacks. The power sector is experiencing an increase i...
详细信息
In real-world scenarios, communication anomalies among multiple agents are inevitable. To address this issue, especially in situations where full-state measurements are unavailable, this paper introduces the concept o...
详细信息
Heightened awareness of the impact of climate change has led to the rapidly increasing penetration of renewable energy resources in electric energy distribution systems. Those distributed energy resources (DERs), most...
详细信息
ISBN:
(纸本)9798331531768;9798331531751
Heightened awareness of the impact of climate change has led to the rapidly increasing penetration of renewable energy resources in electric energy distribution systems. Those distributed energy resources (DERs), mostly inverter-based, can act as resilience sources for the grid but also introduce new control, stability, and cybersecurity challenges. This work proposes a digital twin (DT) that combines a real-time electromagnetic transient power system simulation and a practical model for communication network simulation. The digital twin allows the testing of novel control and cybersecurity strategies, including machine learning-based anomaly detection. Simulations using the Virginia Tech Electric Service (VTES) as a test case demonstrate the capability of adequately controlled resources, including solar PV, energy storage, and a synchronous generator, to enhance resilience by providing energy to critical loads. The DERs comply with ieee disturbance ride-through requirements, and switching transients are maintained within acceptable limits. A comprehensive DER-based resilience plan is developed and validated for the Virginia Tech Smart Grid.
For the efficiency and precision of autonomous exploration, this paper proposes an optimized algorithm for mobile robots in unknown confined environment. However, the traditional algorithms frequently lead to excessiv...
详细信息
暂无评论