Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone *** systems are typically heterogeneous,i.e.,they consist of multiple components implemented with...
详细信息
Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone *** systems are typically heterogeneous,i.e.,they consist of multiple components implemented with different languages and development *** of the main problems nowadays in CPPS implementation is enabling security mechanisms by design while reducing the complexity and increasing the system’s *** the IEC 61499 standard is an excellent approach to tackle these challenges by enabling the design,deployment,and management of CPPS in a model-based engineering *** propose a method for CPPS design based on the IEC 61499 *** method allows designers to embed a bio-inspired anomaly-based host intrusion detection system(A-HIDS)in Edge *** A-HIDS is based on the incremental Dendritic Cell Algorithm(iDCA)and can analyze OPC UA network data exchanged between the Edge devices and detect attacks that target the CPPS’Edge *** study’s findings have practical implications on the industrial security community by making novel contributions to the intrusion detection problem in CPPS considering immune-inspired solutions,and cost-effective security by design system *** to the experimental data,the proposed solution can dramatically reduce design and code complexity while improving application maintainability and successfully detecting network attacks without negatively impacting the performance of the CPPS Edge devices.
The interpretability of stroke risk prediction is still lagging and it can be solved by using deep analysisofdata with the application of the Bayes rule. The prediction model has to be produced with accuracy, clarity,...
详细信息
We propose a method for computational ghost imaging (CGI) with an optical phased array (OPA), wherein phase biases on the phase shifters are intrinsically unknown. In our method, an object is illuminated with a number...
详细信息
The aim of technical education is to design a career-based curriculum that imparts a set of skills to students and enable them to contribute to a nation's economic progress. With their multifarious uses, informati...
详细信息
Elderly people is a segment of population that is quickly increasing during the last years. In the digital society where we live, it is not bearable that this segment of population remains out of the advances in infor...
详细信息
Anomaly detection in manufacturing pipelines remains a critical challenge, intensified by the complexity and variability of industrial environments. This paper introduces AssemAI, an interpretable image-based anomaly ...
详细信息
With the growing demand for wireless networks, network traffic has surged, particularly involving large-scale data transmission. This results in an increased number of network security threats and the emergence of var...
详细信息
In this paper, we first propose a new design strategy of 2D Z-complementary array quads (2D-ZCAQs) with feasible array sizes. A 2D-ZCAQ consists of four distinct unimodular arrays satisfying zero 2D auto-correlation s...
详细信息
Inductive wireless charging has emerged as a viable solution for charging electric vehicles (EVs) both in stationary mode and on the go, i.e., dynamic charging. EVs are produced at a commercial level, and their wired ...
详细信息
Artificial Intelligence is one of the most vital prospects in our current life;its applications vary from robotics, transport, houses, to industrial facilities and planes. While neural networks offer the ability to re...
详细信息
暂无评论