In this paper, the consensus control problem for multi-agent systems (MASs) suffering hybrid attacks is discussed, in which the hybrid attacks include randomly occurring deception attacks on system dynamic behavior an...
详细信息
Utility mining has recently attracted much attention in real-world applications because it fits actual situations. Fuzzy utility mining approaches can discover important high-utility patterns in linguistic terms. Data...
详细信息
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...
详细信息
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research ***,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for *** address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key *** introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive ***,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s *** validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)***,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service *** proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.
Voice interaction has rapidly become the preferred option for human-machine interactions, especially for domotics and wearable applications. In such contexts, the availability of accurate, yet resource-efficient keywo...
详细信息
Clustering algorithms are crucial in uncovering hidden patterns and structures within datasets. Among the density-based clustering algorithms, DBSCAN (Density-Based Spatial Clustering of Applications with Noise) has g...
详细信息
This paper discusses the implementation of time delays in ultra-high-speed applications. Sensorless controls are used to estimate the rotor speed and angle. In model-based sensorless control, the voltage and current s...
详细信息
Deep convolutional neural networks have been widely used in scene classification of remotely sensed images. In this work, we propose a robust learning method for the task that is secure against partially incorrect cat...
详细信息
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
详细信息
controller optimization has mostly been done by minimizing a certain single cost *** practice,however,engineers must contend with multiple and conflicting considerations,denoted as design indices(DIs)in this *** to ac...
详细信息
controller optimization has mostly been done by minimizing a certain single cost *** practice,however,engineers must contend with multiple and conflicting considerations,denoted as design indices(DIs)in this *** to account for such complexity and nuances is detrimental to the applications of any advanced control *** paper addresses this challenge heads on,in the context of active disturbance rejection controller(ADRC)and with four competing DIs:stability margins,tracking,disturbance rejection,and noise *** this end,the lower bound for the bandwidth of the extended state observer is first established for guaranteed closed-loop ***,one by one,the mathematical formula is meticulously derived,connecting each DI to the set of controller *** our best knowledge,this has not been done in the context of *** formulas allow engineers to see quantitatively how the change of each tuning parameter would impact all of the DIs,thus making the guesswork *** example is given to show how such analytical methods can help engineers quickly determine controller parameters in a practical scenario.
This work presents the results of the examination of the HeLa cell line exposure on the ELF-EMF (extremely low-frequency electromagnetic field). In particular, the relationship between ELF-EMF exposition time and cell...
详细信息
暂无评论