The present article is based upon the prerequisite of existence of real needs for reading, storing and reliable transfer of information from sensors. The goal is to present, analyze and evaluate widely accessible and ...
详细信息
Current trends of digitalization and automation in the automotive industry have increased the complexity of computer clusters in different domains of vehicular ecosystems, which are required to support new features. T...
Current trends of digitalization and automation in the automotive industry have increased the complexity of computer clusters in different domains of vehicular ecosystems, which are required to support new features. This has led to redundancy in resource usage in specific use cases, resulting in increased production costs and manufacturer suggested retail price (MSRP) markups for the finalized products. The average retail price of a new vehicle in the United States increased by 13.4% between 2015 and 2020. Considering the global chip shortage of 2020 and current global inflation, the average price of a new vehicle in the United States reached $49,500 in 2023 [1]. With the electrification of current automotive platforms underway, as well as the move to centralized system architectures, new approaches to inter-domain communication are expected. This paper proposes a solution of a distributed AUTOSAR Adaptive system that can establish communication with the In-Vehicle Infotainment (IVI) domain. The proof of concept implemented in a controlled environment proves viable for inter-domain communication, as it provides good scalability and adaptability to different scenarios. The use of a distributed approach facilitates the applicability of distributed system principles, allowing for the implementation of a stable system.
Finite-difference time-domain is a numerical method used for modelling of computational electrodynamics. The method is resource intensive, especially regarding memory usage since multiple memory accesses are required ...
Finite-difference time-domain is a numerical method used for modelling of computational electrodynamics. The method is resource intensive, especially regarding memory usage since multiple memory accesses are required per single computation. In other words, memory, or more precisely its speed, is a limiting factor for the overall performance. Existing solutions focus either on structures with great parallelism such as graphical processing units or custom designs. The former have issues with underutilized resources, while the latter require significant time and effort to achieve similar or slightly better performances. The approach taken during this research was to target the memory itself and find a way to improve the efficiency of memory usage across multiple platforms. The main contribution of the paper is using block floating-point in a novel way regarding the finite-difference time-domain method. The presented solution is a verification of earlier research, proving that the performance of this algorithm can indeed be improved using the suggested methods.
This paper presents a comprehensive experimental study of a novel trust-based security architecture for edge computing environments. We introduce an adaptive security framework that combines dynamic trust evaluation w...
详细信息
This paper presents a comprehensive experimental study of a novel trust-based security architecture for edge computing environments. We introduce an adaptive security framework that combines dynamic trust evaluation with decentralized decision-making mechanisms to enhance threat detection and system resilience. Through extensive simulation experiments, we evaluate the architecture's performance across various network configurations, ranging from 20 to 100 nodes, with different operational parameters and security event patterns. The simulation framework implements a sophisticated spatial distribution model for edge nodes, incorporating computational constraints, memory limitations, and communication boundaries typical of edge computing environments. Our results demonstrate that the proposed architecture achieves an 83.0% threat detection rate while maintaining network resilience at 95.6%, significantly exceeding baseline security requirements. The trust management mechanism demonstrates robust adaptation to security events, maintaining average trust scores of 78.6% despite active security incidents. We provide detailed analysis of system behavior under various attack scenarios, including intrusion attempts, data leaks, DDoS attacks, and authentication failures. The architecture shows exceptional scalability characteristics, with improved detection rates and trust stability in larger network configurations. Performance metrics reveal consistent achievement above target thresholds across all evaluated dimensions, with minimum trust levels maintaining a 7.2 percentage point margin above requirements. Our findings provide empirical validation of the architecture's effectiveness while offering practical insights into deployment considerations for edge computing security. The study contributes to the field by establishing quantitative benchmarks for security performance in edge environments and demonstrating the viability of trust-based security mechanisms for distributed
In this paper we show that a wide class of compartmental systems with bounded capacities called generalized ribosome flow models are stable with an entropy-like logarithmic Lyapunov function known from the theory of n...
详细信息
In this paper we show that a wide class of compartmental systems with bounded capacities called generalized ribosome flow models are stable with an entropy-like logarithmic Lyapunov function known from the theory of nonnegative systems and reaction networks. The stability proof uses the kinetic representation of the compartmental model and earlier approaches applied for the input-to-state stability analysis of reaction networks with time-varying reaction rates. The results are valid not only for mass action type systems but also for models with more general reaction rates. Illustrative examples are given to show the qualitative dynamical properties of simple generalized ribosome flow models.
The paper discusses the problem of automatic tuning of the PID controller. The auto-tuning algorithm of the PID controller based on one machine learning method, which is equivalent to the steepest descent, is proposed...
详细信息
One of the leading causes of cancer-related death for women is still breast cancer, which highlights the importance of early and precise diagnosis techniques. Despite medical imaging and deep learning advances, curren...
详细信息
In this article, we consider the time-optimal motion control of a tracked mobile robot in the presence of state constraints. The complexity of the problem statement is due to a steady vector flow field in which the mo...
详细信息
In this article, we consider the time-optimal motion control of a tracked mobile robot in the presence of state constraints. The complexity of the problem statement is due to a steady vector flow field in which the motion is takes place. The difficulty of the considered model is also compounded with the non-regularity of the dynamics with respect to the state constraints. A method for regularisation is proposed. Such a method involves a certain construction of a regular (in the needed sense) ε-perturbation of the original problem.
The paper discusses a data science competition centered around the development of an anomaly detection system for IoT devices. The competition utilized a unique environment that allowed for the operation and monitorin...
详细信息
The article presents an analysis of the profitability of an investment consisting of a heat pump and a photovoltaic installation located in Poland for an exemplary single-family house. The factors that have a signific...
详细信息
暂无评论