This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is har...
详细信息
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is hard to control because wind,rain,and insects carry *** researchers utilized a deep learning system to identify CBD in coffee cherries at three growth stages and classify photographs of infected and uninfected cherries with 93%accuracy using a random forest *** the dataset is too small and noisy,the algorithm may not learn data patterns and generate accurate *** overcome the existing challenge,early detection of Colletotrichum Kahawae disease in coffee cherries requires automated processes,prompt recognition,and accurate *** proposed methodology selects CBD image datasets through four different stages for training and *** to train a model on datasets of coffee berries,with each image labeled as healthy or *** themodel is trained,SHAP algorithmto figure out which features were essential formaking predictions with the proposed *** of these characteristics were the cherry’s colour,whether it had spots or other damage,and how big the Lesions *** inception is important for classification to virtualize the relationship between the colour of the berry is correlated with the presence of *** evaluate themodel’s performance andmitigate excess fitting,a 10-fold cross-validation approach is *** involves partitioning the dataset into ten subsets,training the model on each subset,and evaluating its *** comparison to other contemporary methodologies,the model put forth achieved an accuracy of 98.56%.
The primary objective of fog computing is to minimize the reliance of IoT devices on the cloud by leveraging the resources of fog network. Typically, IoT devices offload computation tasks to fog to meet different task...
详细信息
The primary objective of fog computing is to minimize the reliance of IoT devices on the cloud by leveraging the resources of fog network. Typically, IoT devices offload computation tasks to fog to meet different task requirements such as latency in task execution, computation costs, etc. So, selecting such a fog node that meets task requirements is a crucial challenge. To choose an optimal fog node, access to each node's resource availability information is essential. Existing approaches often assume state availability or depend on a subset of state information to design mechanisms tailored to different task requirements. In this paper, OptiFog: a cluster-based fog computing architecture for acquiring the state information followed by optimal fog node selection and task offloading mechanism is proposed. Additionally, a continuous time Markov chain based stochastic model for predicting the resource availability on fog nodes is proposed. This model prevents the need to frequently synchronize the resource availability status of fog nodes, and allows to maintain an updated state information. Extensive simulation results show that OptiFog lowers task execution latency considerably, and schedules almost all the tasks at the fog layer compared to the existing state-of-the-art. IEEE
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing *** task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog *** process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource *** this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local *** balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization *** FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response *** relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
Accurately predicting the knee point cycle number,marking the onset of accelerated capacity degradation,is the first critical signal for managing lithium-ion battery life cycles in electric vehicles and stationary ene...
详细信息
Accurately predicting the knee point cycle number,marking the onset of accelerated capacity degradation,is the first critical signal for managing lithium-ion battery life cycles in electric vehicles and stationary energy storage ***,the inherent electrochemo-mechanical-thermal complexities of battery aging present significant challenges for physics-based models and machine-learning models,often leading to reduced predictive *** study developed a comprehensive dataset comprising 20 lithium nickel manganese cobalt oxide(NCM)/graphite cells(0.5-1 C) from our lab and 162 commercial lithium iron phosphate(LFP)/graphite cells(3-6 C) from the public database,with knee point observed between 100 and 1000 *** proposed a new strategy to extract novel features with strong physical context from early-cycle voltage curves,enabling precise knee point predictions across the chemistries without the need for extensive cycling *** model achieved a mean absolute percentage error(MAPE) of 7% for knee point prediction using five selected ***,the model yielded 8% MAPE with only one single feature across the initial 200 cycles,and 10% MAPE when applying five features across the initial 50 cycles,spanning different battery *** work highlights the potential of integrating multi-chemistry datasets with data-driven modeling to forecast aging patterns across diverse battery chemistries,advancing battery longevity and reliability.
暂无评论