In this paper, we propose a cloud-based virtual commissioning Web platform for IEC 61499 compliant distributed automation systems that support Create-Read-Update-Delete operations for SoftPLC containers from various v...
详细信息
This paper considers the problem of platooning control of connected automated vehicles under cyber-attacks. Specifically, the attacker aims to prevent the follower vehicle from maintaining a pre-defined safe distance ...
详细信息
The efficient distribution of function blocks across programmable logic controllers (PLCs) is critical to improving the performance of distributed automation systems. This paper presents a novel randomized greedy opti...
详细信息
This paper presents a novel framework for testing automation applications compliant with the international standard IEC 61499 and including process simulation. The framework enables automation programs to be run in te...
详细信息
This paper proposes an extension to IEC 61499 architecture to better support flexibility and reconfigurability of automation systems while reducing communication overhead. The extension concerns adapter connections be...
详细信息
A sliding mode control algorithm based on a linear extended state observer is proposed to address the multi-source uncertainty of uncalibrated visual servoing in robotic arms. Uncertainty, nonlinearity, coupling, exte...
详细信息
Leakage assessment at the Register Transfer Level (RTL) is essential for identifying vulnerabilities in various designs, including cryptographic systems, AI models, and other applications handling sensitive data durin...
详细信息
The problem of unknown input observer design is considered for coupled PDE/ODE systems subject to incremental sector bounded nonlinearities and unknown boundary inputs. Assuming available measurements at the boundary ...
详细信息
Hyperspectralchannel reconstruction transforms a subsampled multispectral image into hyperspectral imaging, providing higher spectral resolution without a dedicated acquisition hardware and camera. Multi-stage Spectra...
详细信息
Strongly stealthy cyber-attacks in networked vehicle queue (V2V) network environments often manifest themselves as small changes to data, which makes it difficult for existing methods to effectively detect such attack...
详细信息
暂无评论