As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur...
详细信息
The demand for decentralized control techniques in DC microgrids has increased due to their ability to enhance scalability, reduce communication requirements, and improve overall system efficiency. This paper presents...
详细信息
Industrial automation has become a cornerstone of modern manufacturing, enhancing efficiency, reliability, and scalability. The integration of intelligent control algorithms, such as fuzzy logic, neural networks, gene...
详细信息
Internet of Things (IoT), sensor technologies, and low-power long-range wide area network (LoRaWAN) protocols are crucial to reducing water wastage during storage and distribution. This letter proposes a LoRa-based au...
详细信息
For the practical fixed-time average consensus problem in a first-order nonlinear faulty MAS with disturbances under switching topologies, on the basis of a dynamic event-triggered system, a fixed-time consensus metho...
详细信息
Serverless applications are based on Function-as-a-Service (FaaS) platforms where serverless functions interact with other cloud-specific services. The integration of these components is crucial for the application’s...
详细信息
AI-based Test automation for Cloud-Based Big Advanced Data Systems this method used AI and other new data science methods such as big data, cloud computing, etc. Current testing methodologies do not suit the environme...
详细信息
College of Computer Science Beijing University of Technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu...
详细信息
This paper aims to examine the practical input-to-state stability (p-ISS) of stochastic T-S fuzzy systems (T-SFS) with parameter uncertainty by employing dynamic event-triggered control (DETC). In order to reduce the ...
详细信息
DC microgrids, due to their deep integration of control, computing, communication technologies, and physical equipment, are susceptible to cyber-attacks. Consequently, this paper is dedicated to the development of a n...
详细信息
暂无评论