Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in cyber-physical systems within the framework of discrete event systems. Specifically, we consider a scenario where a malicious intruder injects a jamming signal into an actuator channel. It disrupts the transmission of control commands and prevents an actuator from receiving them. This is termed an actuator jamming attack. In the paper, we first analyze the closed-loop system behavior under such an attack. An attack structure is constructed to illustrate how an intruder exploits a jamming attack to drive a system into unsafe states. Then, we study the supervisory control problem for a system exposed to such an attack. The problem is reduced to a basic supervisory control one in discrete event systems by introducing the concept of dynamically controllable language. A solution to this problem is explored, where we establish an existence condition for a supremal and robust supervisor that is capable of defending against actuator jamming attacks, and design an algorithm to derive it. Finally, the effectiveness of our method is illustrated by an intelligent automated guided vehicle system. IEEE
The implementation of the base components of neuro-like cryptographic data protection systems using FPGA is considered. The structure of the data encryption module using polynomials based on a neuro-like network was d...
详细信息
The paper considers risk management and strategies for risk reduction in farming. Different sources of risk are presented that happen on farms. The paper reveals some approaches to farmer’s decision-making to reduce ...
详细信息
ISBN:
(数字)9798350369380
ISBN:
(纸本)9798350369397
The paper considers risk management and strategies for risk reduction in farming. Different sources of risk are presented that happen on farms. The paper reveals some approaches to farmer’s decision-making to reduce the risk. An algorithm is proposed which can be applied to risk management in farms. The cycle of decision-making in farms is visually presented. Graphical representation is also available for risk management strategies. The paper presents an overview of the risk management and risk management strategies in farms.
Thepaper deals with a formalized description of a computer-aided crop rotation engineering system based on a mathematical crop system optimization model implemented in the digital platform for industry management that...
详细信息
ISBN:
(数字)9798350375718
ISBN:
(纸本)9798350375725
Thepaper deals with a formalized description of a computer-aided crop rotation engineering system based on a mathematical crop system optimization model implemented in the digital platform for industry management that would offer an ontological and functional integration of farming industry objectives from the joint science-based point of view. The paper demonstrates that when it comes to the digital economy, crop rotation should be the focal point in precision agriculture that all the farming processes are based on.
A model of a two-level hierarchical system with many participants is studied assuming that lower-level elements choose Pareto optimal outcomes. Two classes of games are studied: without feedback and with feedback. The...
详细信息
ISBN:
(数字)9798350375718
ISBN:
(纸本)9798350375725
A model of a two-level hierarchical system with many participants is studied assuming that lower-level elements choose Pareto optimal outcomes. Two classes of games are studied: without feedback and with feedback. The maximal guaranteed results are found.
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
This paper discusses a mathematical model for establishing a single digital logistics platform as a link between all participants in the added-value creation chain, including producers, resource and services suppliers...
详细信息
Digital signal processing of electroencephalography(EEG)data is now widely utilized in various applications,including motor imagery classification,seizure detection and prediction,emotion classification,mental task cl...
详细信息
Digital signal processing of electroencephalography(EEG)data is now widely utilized in various applications,including motor imagery classification,seizure detection and prediction,emotion classification,mental task classification,drug impact identification and sleep state *** the increasing number of recorded EEG channels,it has become clear that effective channel selection algorithms are required for various *** Whale Optimization Method(Guided WOA),a suggested feature selection algorithm based on Stochastic Fractal Search(SFS)technique,evaluates the chosen subset of *** may be used to select the optimum EEG channels for use in Brain-computer Interfaces(BCIs),the method for identifying essential and irrelevant characteristics in a dataset,and the complexity to be *** enables(SFS-Guided WOA)algorithm to choose the most appropriate EEG channels while assisting machine learning classification in its tasks and training the classifier with the ***(SFSGuided WOA)algorithm is superior in performance metrics,and statistical tests such as ANOVA and Wilcoxon rank-sum are used to demonstrate this.
control of users' access to the information system is the main part of the security system. Moreover, it must work in real time and be easily reconfigured. Such controller can be built by using fuzzy logic. In thi...
详细信息
The main contribution of the research is the neural network concept of Ukrainian-language text embedding with a two-level architecture. Basic embedding is implemented based on main lexical structures (Noun-Verb, Noun-...
详细信息
暂无评论