In this paper, a study on the Field Programmable Gate Array (FPGA)-based Proportional-Integral-Derivative (PID) control of an Unmanned Aerial Vehicle (UAV) is presented. The goal is to implement four PID controllers i...
详细信息
Effective integration of available resources within edge nodes is essential to improve the performance of vehicular edge computing (VEC) to support various randomly offloaded tasks with limited computing capacity and ...
详细信息
The purpose of writing this paper is to find the optimized digital colour recommendation model based on the semantic colour synaesthesia annotation labels with digital HSV (Hue saturation and brightness value colour c...
详细信息
An optimal investment strategy and optimal delay retirement time of defined-contribution pension which want to achieve the expected utility maximization problem of the terminal wealth were studied in this paper. First...
详细信息
This paper describes a computing in memory array based on 10T SRAM cells for realizing the subtraction operation of 8bit inputs with 8bit weights in SAD operations, and it is able to achieve high discharge linearity b...
详细信息
In recent years, with the development of cloud computing and Internet of Things technology, earthquake observation technology has made tremendous *** earthquake agency developed a low-cost local magnetic field observa...
详细信息
ISBN:
(纸本)9798350389913;9798350389906
In recent years, with the development of cloud computing and Internet of Things technology, earthquake observation technology has made tremendous *** earthquake agency developed a low-cost local magnetic field observation system based on cloud architecture to carry high-density deployed sensors. With the increasing deployment of sensors and the richness of application scenarios, existing access control models couldn't meet the needs of actual business *** original access control technology was based on physical network security protocols and IoT device security *** it could eliminate some security risks during the access process, there were still shortcomings that couldn't be well adapted to the needs of large-scale IoT device deployment ***, using complex access control models may result in neglecting the low local computing power of IoT geomagnetic field observation *** order to solve the above problems, the project team conducted research and analysis on access control between geomagnetic observation devices based on fog computing and combined with blockchain *** IoT access control model suitable for geomagnetic observation network systems was designed based on research *** model uses fog node agents to place the main work on the blockchain for completion and solve the problem of low computing power in some IoT *** smart contracts, the model has achieved control over device access permissions,it provided an effective and secure method for IoT access control.
In all position welding, the reasonable setting of welding process parameters at different positions and effective control of smooth transition are one of the difficulties in the automation of pipeline circumferential...
详细信息
In this paper a decentralized sliding mode controller with state observer is proposed which is based on Proportional plus Integral Sliding surfaces for MIMO (multi-input-multi-output) *** processes are complex to cont...
详细信息
In textile processes, accurate temperature control is crucial in order to achieve right first time dyeing. The widely used PI (Proportional-Integral) controllers in the industry are difficult to tune by using standard...
详细信息
ISBN:
(纸本)9781665495721
In textile processes, accurate temperature control is crucial in order to achieve right first time dyeing. The widely used PI (Proportional-Integral) controllers in the industry are difficult to tune by using standard methods as the dyeing process is highly complex and batch-varying. In this paper, a novel PI auto-tuning method suitable for temperature control in a variety of textile dyeing processes is developed and implemented. Simulation and field application results are provided in order to confirm the success of the proposed technique.
In recent years, there has been an increase in Cloud Continuum adoption to support Internet of Things applications. Inevitably, such a paradigm introduces novel security challenges, particularly concerning the securit...
详细信息
ISBN:
(纸本)9798350339826
In recent years, there has been an increase in Cloud Continuum adoption to support Internet of Things applications. Inevitably, such a paradigm introduces novel security challenges, particularly concerning the security of communicating nodes to prevent malicious actors from tampering within the network, and ensuring the confidentiality of sensitive data during transmissions. Traditional security methods often fall short in addressing these issues, especially where network nodes are built upon resource-constrained devices. Consequently, the scientific community has begun exploring the potential of Physical Unclonable Functions (PUFs), which are unique digital identifiers derived from the inherent variability in the manufacturing process of integrated circuits, as a means to enhance security mechanisms at minimal overhead cost. This paper introduces Secure-PHEMAP (S-PHEMAP), a novel and lightweight PUF-based key management scheme designed for end-to-end communications that guarantees authenticity, confidentiality and integrity for pair communications. The proposed scheme builds upon the PHEMAP protocols, inheriting its security properties. S-PHEMAP can be employed in scenarios where both communicating devices embeds a PUF or in situations where only one of them has a PUF. In addition, the paper includes a deployment strategy in a Cloud Continuum domain, by leveraging the Chef automation framework.
暂无评论