With the soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. This paper examines the security risks in ...
详细信息
This work analyzes the computing performance of distributed control systems in IEC 61499 on two hardware devices, Dell XPS workstation and Raspi 4B. Based on the test IEC 61499 application, three different system conf...
详细信息
In this contribution, the Dynamic Mode Decomposition with control (DMDc) is used to derive a surrogate model of a continuous PHA biopolymer production process based on a recently published complex process model. Here,...
详细信息
Modern complex chemical-technological systems as automation objects are distinguished by the presence of a large number of controlled and uncontrolled parameters, high productivity, technological modes intensity and o...
详细信息
Computer-based scientific experiments are becoming increasingly data-intensive, necessitating the use of High-Performance computing (HPC) clusters to handle large scientific workflows. These workflows result in comple...
详细信息
ISBN:
(纸本)9783031786655;9783031786662
Computer-based scientific experiments are becoming increasingly data-intensive, necessitating the use of High-Performance computing (HPC) clusters to handle large scientific workflows. These workflows result in complex data and control flows within the system, making analysis challenging. This paper focuses on the extraction of case IDs from SLURM-based HPC cluster logs, a crucial step for applying mainstream process mining techniques. The core contribution is the development of methods to correlate jobs in the system, whether their interdependencies are explicitly specified or not. We present our log extraction and correlation techniques, supported by experiments that validate our approach, enabling comprehensive documentation of workflows and identification of performance bottlenecks.
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se...
详细信息
Robotic processautomation (RPA) is an emerging approach designed to automate repetitive human tasks through the use of software-based robots. In the context of business processes, RPA involves configuring these softw...
详细信息
Since most communications in vehicular networks rely on wireless transmissions, information broadcast by vehicles is highly susceptible to interception and eavesdropping by third parties, making it vulnerable to vario...
详细信息
This study proposes a modeling optimization method based on three-dimensional graphics for the modeling problem of complex geometric structures in the intelligent construction process. This method uses the Marching Cu...
详细信息
The Industrial Internet of Things (IIoT) has become a crucial technology driving the transformation of manufacturing towards intelligence. Traditional industrial networks primarily focus on data collection, whereas em...
详细信息
暂无评论