Extreme edge computing (EEC) exploits the untapped computational power of end devices, referred to as extreme edge devices (EEDs), and thus holds the potential to revolutionize the digital twin (DT) technology. Howeve...
详细信息
Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf...
详细信息
Arabic script is exhibited in a cursive style, which is a departure from the norm in many common languages, and the shapes of letters are contingent on their positions within words. The form of the first letter is inf...
详细信息
This paper presents a novel wideband circularly polarized (CP) cavity-backed slot antenna based on Substrate Integrated Waveguide (SIW) technology, designed for compact and high-efficiency performance. The proposed an...
详细信息
Promoting the high penetration of renewable energies like photovoltaic(PV)systems has become an urgent issue for expanding modern power grids and has accomplished several challenges compared to existing distribution *...
详细信息
Promoting the high penetration of renewable energies like photovoltaic(PV)systems has become an urgent issue for expanding modern power grids and has accomplished several challenges compared to existing distribution *** study measures the effectiveness of the Puma optimizer(PO)algorithm in parameter estimation of PSC(perovskite solar cells)dynamic models with hysteresis consideration considering the electric field effects on *** models used in this study will incorporate hysteresis effects to capture the time-dependent behavior of PSCs *** PO optimizes the proposed modified triple diode model(TDM)with a variable voltage capacitor and resistances(VVCARs)considering the hysteresis *** suggested PO algorithm contrasts with other wellknown optimizers from the literature to demonstrate its *** results emphasize that the PO realizes a lower RMSE(Root mean square errors),which proves its capability and efficacy in parameter extraction for the *** statistical results emphasize the efficiency and supremacy of the proposed PO compared to the other well-known competing *** convergence rates show good,fast,and stable convergence rates with lower RMSE via PO compared to the other five competitive ***,the lowermean realized via the PO optimizer is illustrated by the box plot for all optimizers.
Industrial Cyber-Physical Systems (ICPSs) are an integral component of modern manufacturing and industries. By digitizing data throughout product life cycles, Digital Twins (DTs) in ICPSs enable a shift from current i...
详细信息
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...
详细信息
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
This letter proposes a robust secure beamforming (BF) scheme for a satellite-terrestrial integrated network (STIN), where earth stations are served by the satellite network in presence of multiple eavesdroppers, and t...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Water Quality Sensors (WQSs) are becoming a promised tool in water quality data assessment and scientific value of aquatic structure. Such sensors are broadly used to produce live results by evaluating major water qua...
详细信息
暂无评论