Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanism...
详细信息
Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and monitoring system using switches and controllers that will route the packets through the network, identify any false nodes, take preventive measures against them and preventing them for any future problems. Next, the system is powered by Blockchain cryptographic features by utilizing the TrustChain features to create a private, secure, and temper-free ledger of the transactions performed inside the network. Results are achieved in the legitimate devices connecting to the network, transferring their packets to their destination under supervision, reporting whenever a false node is causing hurdles, and recording the transactions for temper-proof records. Evaluation results based on 1000+ transactions illustrate that the proposed mechanism not only outshines most aspects of Cyber-Physical systems but also consumes less computation power with a low latency of 0.1 seconds only.
The hybrid photovoltaic(PV)-battery energy storage system(BESS)plant(HPP)can gain revenue by performing energy arbitrage in low-carbon power ***,multiple operational uncertainties challenge the profitability and relia...
详细信息
The hybrid photovoltaic(PV)-battery energy storage system(BESS)plant(HPP)can gain revenue by performing energy arbitrage in low-carbon power ***,multiple operational uncertainties challenge the profitability and reliability of HPP in the day-ahead *** paper proposes two coherent models to address these ***,a knowledge-driven penalty-based bidding(PBB)model for HPP is established,considering forecast errors of PV generation,market prices,and under-generation ***,a data-driven dynamic error quantification(DEQ)model is used to capture the variational pattern of the distribution of forecast *** role of the DEQ model is to guide the knowledgedriven bidding ***,the DEQ model aims at the statistical optimum,but the knowledge-driven PBB model aims at the operational *** two models have independent optimizations based on misaligned *** address this,the knowledge-data-complementary learning(KDCL)framework is proposed to align data-driven performance with knowledge-driven objectives,thereby enhancing the overall performance of the bidding strategy.A tailored algorithm is proposed to solve the bidding *** proposed bidding strategy is validated by using data from the National Renewable Energy Laboratory(NREL)and the New York Independent System Operator(NYISO).
Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one...
详细信息
This paper presents the development of an Internet of Things (IoT)-based Transit Tracking System. At the Faculty of engineering, King Mongkut's Institute of Technology Ladkrabang, a public transportation system ha...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,a...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,academia and industry have used a variety of interpretations,and the scientific literature lacks a unified and consistent definition of this *** purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature,beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing ***,this investigationwill focus on the research conducted on Industry 4.0 and smartmanufacturing,elucidating the diverse applications of digital twins in fields including aerospace,intelligentmanufacturing,intelligent transportation,and intelligent cities,among others.
Resonant operation, exploiting high quality-factor planar inductors, has recently enabled gigahertz (GHz) applications for large-area electronics (LAE), providing a new technology platform for large-scale and flexible...
详细信息
Stochastic computing(SC)has a substantial amount of study on application-specific integrated circuit(ASIC)design for artificial intelligence(AI)edge computing,especially the convolutional neural network(CNN)***,SC has...
详细信息
Stochastic computing(SC)has a substantial amount of study on application-specific integrated circuit(ASIC)design for artificial intelligence(AI)edge computing,especially the convolutional neural network(CNN)***,SC has little to no optimization on field-programmable gate array(FPGA).Scaling up the ASIC logic without FPGA-oriented designs is inefficient,while aggregating thousands of bitstreams is still challenging in the conventional *** research has reinvented several FPGA-efficient 8-bit SC CNN computing architectures,i.e.,SC multiplexer multiply-accumulate,multiply-accumulate function generator,and binary rectified linear unit,and successfully scaled and implemented a fully parallel CNN model on Kintex7 *** proposed SC hardware only compromises 0.14%accuracy compared to binary computing on the handwriting Modified National Institute of Standards and Technology classification task and achieved at least 99.72%energy saving per image feedforward and 31?more data throughput than modern *** to SC,early decision termination pushed the performance baseline exponentially with minimum accuracy loss,making SC CNN extremely lucrative for AI edge computing but limited to classification *** SC's inherent noise heavily penalizes CNN regression performance,rendering SC unsuitable for regression tasks.
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
Though an accurate discretization approach for gas flow dynamics, the method of characteristics (MOC) is liable to instability for inappropriate step sizes. This letter addresses the numerical stability limitation of ...
详细信息
Though an accurate discretization approach for gas flow dynamics, the method of characteristics (MOC) is liable to instability for inappropriate step sizes. This letter addresses the numerical stability limitation of MOC, in the context of lEGS's optimal scheduling. Specifically, the proposed method enables flexible temporal step sizes without sacrificing accuracy, significantly reducing non-convergence due to numerical oscillations. The effectiveness of the proposed method is validated through case studies in different simulation settings.
暂无评论