In this letter, we introduce a novel anti-windup design approach for internal model control (IMC) that addresses the issue of asymmetric input saturation. To enhance closed-loop performance during periods of saturatio...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,...
详细信息
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, and selfdriving capabilities for improved system performance. In this paper, we explore the evolution of data systems with a focus on deepening the fusion of AI and DB. We present NeurDB, an AI-powered autonomous data system designed to fully embrace AI design in each major system component and provide in-database AI-powered analytics. We outline the conceptual and architectural overview of NeurDB, discuss its design choices and key components, and report its current development and future plan.
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy...
详细信息
Nonlinear impairments from transceiver components in short-reach optical communication systems, such as drivers, TIAs, and external modulators, pose significant challenges for achieving high data rates with low latenc...
详细信息
With the increasing penetration of photovoltaic (PV) systems posing challenges to power system stability, this paper investigates the effectiveness of grid-forming controlled PV systems in providing frequency ancillar...
详细信息
In DC distributed power systems(DPSs),the complex impedance interactions possibly lead to DC bus voltage oscillation or *** previous research,the stability analysis of DPSs is implemented based on mathematical analysi...
详细信息
In DC distributed power systems(DPSs),the complex impedance interactions possibly lead to DC bus voltage oscillation or *** previous research,the stability analysis of DPSs is implemented based on mathematical analysis in control *** specific mechanisms of the instability of the cascade system have not been intuitively *** this paper,the stability analysis of DPSs based on the traditional Nyquist criterion is simplified to the resonance analysis of the seriesconnected port impedance(Z=R+jX)of source and load *** reveals that the essential reason for impedance instability of a DC cascade system is that the negative damping characteristic(R<0)of the port the overall impedance amplifies the internal resonance source at reactance zero-crossing *** simplified stability criterion for DC cascade systems can be concluded as:in the negative damping frequency ranges(R<0),there exists no zero-crossing point of the reactance component(i.e.,X=0).According to the proposed stability criterion,the oscillation modes of cascade systems are classified.A typical one is the internal impedance instability excited by the negative damping,and the other one is that the external disturbance amplified by negativity in a low stability ***,the impedance reshaping method for stability improvement of the system can be further *** validity of the simplified criterion is verified theoretically and experimentally by a positive damping reshaping method.
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The sustainable and economical production of hydrogen is pivotal to the energy transition. This study assesses the techno-economic feasibility of green hydrogen in the unexploited northwest landlocked regions of Oman,...
详细信息
Demand response has been recognized as a valuable functionality of power systems for mitigating power *** paper proposes a hierarchical control strategy among the distribution system operator(DSO),load aggregators(LAs...
详细信息
Demand response has been recognized as a valuable functionality of power systems for mitigating power *** paper proposes a hierarchical control strategy among the distribution system operator(DSO),load aggregators(LAs),and thermostatically controlled loads(TCLs);the strategy includes a scheduling layer and an executive layer to provide load *** the scheduling layer,the DSO(leader)offers compensation price(CP)strategies,and the LAs(followers)respond to CP strategies with available regulation power(ARP)*** of the DSO and LAs are modeled according to their behaviors during the load regulation *** game is adopted to capture interactions among the players and leader and to obtain the optimal strategy for each participant to achieve ***,considering inevitable random factors in practice,e.g.,renewable generation and behavior of users,two different stochastic models based on sample average approximation(SAA)and parameter modification are formulated with improved scheduling *** the executive layer,distributed TCLs are triggered based on strategies determined in the scheduling layer.A self-triggering method that does not violate user privacy is presented,where TCLs receive external signals from the LA and independently determine whether to alter their operation *** simulations are performed on the modified IEEE-24 bus system to verify effectiveness of the proposed strategy.
暂无评论