This study proposes the application of a Lyapunov-based Model Predictive Control (L-MPC) approach to a 9-level Crossover Switches Cell (CSC9) converter operating in grid connection mode. The proposed method utilizes t...
详细信息
Cyber-physical systems (CPS) play a pivotal role in modern critical infrastructure, spanning sectors such as energy, transportation, healthcare, and manufacturing. These systems combine digital and physical elements, ...
详细信息
ISBN:
(数字)9798350369274
ISBN:
(纸本)9798350369281
Cyber-physical systems (CPS) play a pivotal role in modern critical infrastructure, spanning sectors such as energy, transportation, healthcare, and manufacturing. These systems combine digital and physical elements, making them susceptible to a new class of threats known as cyber kinetic vulnerabilities. Such vulnerabilities can exploit weaknesses in the cyber world to force physical consequences and pose significant risks to both human safety and infrastructure integrity. This paper presents a novel tool, named Rampo, that can perform binary code analysis to identify cyber kinetic vulnerabilities in CPS. The proposed tool takes as input a Signal Temporal Logic (STL) formula that describes the kinetic effect—i.e., the behavior of the "physical" system—that one wants to avoid. The tool then searches the possible "cyber" trajectories in the binary code that may lead to such "physical" behavior. This search integrates binary code analysis tools and hybrid systems falsification tools using a Counter-Example Guided Abstraction Refinement (CEGAR) approach. In particular, Rampo starts by analyzing the binary code to extract symbolic constraints that represent the different paths in the code. These symbolic constraints are then passed to a Satisfiability Modulo Theories (SMT) solver to extract the range of control signals that can be produced by each of the paths in the code. The next step is to search over possible "physical" trajectories using a hybrid systems falsification tool that adheres to the behavior of the "cyber" paths and yet leads to violations of the STL formula. Since the number of "cyber" paths that need to be explored increases exponentially with the length of "physical" trajectories, we iteratively perform refinement of the "cyber" path constraints based on the previous falsification result and traverse the abstract path tree obtained from the control program to explore the search space of the system. To illustrate the practical utility of binary code ana
This paper proposes using multiple reconfigurable intelligent surfaces (RISs) in SISO communications, considering that RISs can flexibly extend the wireless communication range. In a given area with multiple RISs, we ...
详细信息
In a recent breakthrough [BGM23, GZ23, AGL23], it was shown that randomly punctured Reed-Solomon codes are list decodable with optimal list size with high probability, i.e., they attain the Singleton bound for list de...
详细信息
The transformer architecture has prevailed in various deep learning settings due to its exceptional capabilities to select and compose structural information. Motivated by these capabilities, Sanford et al. (2023) pro...
The transformer architecture has prevailed in various deep learning settings due to its exceptional capabilities to select and compose structural information. Motivated by these capabilities, Sanford et al. (2023) proposed the sparse token selection task, in which transformers excel while fully-connected networks (FCNs) fail in the worst case. Building upon that, we strengthen the FCN lower bound to an average-case setting and establish an algorithmic separation of transformers over FCNs. Specifically, a one-layer transformer trained with gradient descent provably learns the sparse token selection task and, surprisingly, exhibits strong out-of-distribution length generalization. We provide empirical simulations to justify our theoretical findings.
The investigation examines the application of Support Vector Machines (SVMs) for blame location and classification in electrical frameworks, pointing to an upgrade of the reliability of critical foundations. Four SVM-...
详细信息
Integrated access and backhaul (IAB) is a promising solution to improve coverage at low deployment costs. In IAB networks, due to wireless channel variations, guaranteeing delay for delay-sensitive applications is a m...
详细信息
A satellite transponder's communication channel is studied in this paper. The multiple terminal users in this channel compete for limited radio resources to satisfy their own data rate needs. Because inter-user in...
详细信息
Predicting financial markets and stock price movements requires analyzing a company’s performance, historic price movements, industry-specific events alongside the influence of human factors such as social media and ...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Predicting financial markets and stock price movements requires analyzing a company’s performance, historic price movements, industry-specific events alongside the influence of human factors such as social media and press coverage. We assume that financial reports (such as income statements, balance sheets, and cash flow statements), historical price data, and recent news articles can collectively represent aforementioned *** combine financial data in tabular format with textual news articles and employ pre-trained Large Language Models (LLMs) to predict market movements. Recent research in LLMs has demonstrated that they are able to perform both tabular and text classification tasks, making them our primary model to classify the multi-modal data. We utilize retrieval augmentation techniques to retrieve and attach relevant chunks of news articles to financial metrics related to a company and prompt the LLMs in zero, two, and four-shot settings. Our dataset contains news articles collected from different sources, historic stock price, and financial report data for 20 companies with the highest trading volume across different industries in the stock market. We utilized recently released language models for our LLM-based classifier, including GPT- 3 and 4, and LLaMA- 2 and 3 *** introduce an LLM-based classifier capable of performing classification tasks using combination of tabular (structured) and textual (unstructured) data. By using this model, we predicted the movement of a given stock’s price in our dataset with a weighted F1-score of 58.5% and 59.1% and Matthews Correlation Coefficient of 0.175 for both 3-month and 6-month *** dataset and codes for this paper can be found on Github. https://***/aliielahi/FinedFMP 1
An error correcting code C: Σk → Σn is efficiently list-recoverable from input list size if for any sets L1,..., Ln ⊆ Σ of size at most , one can efficiently recover the list L = {x ∈ Σk : ∀j ∈ [n], C(x)j ∈ Lj...
详细信息
暂无评论