Learning-based distribution system state estimation (DSSE) methods typically depend on sufficient fully labeled data to construct mapping functions. However, collecting historical labels (state variables) can be chall...
详细信息
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti...
详细信息
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-time systems, we proposed an exact Boolean analysis based on interference(EBAI) for schedulability analysis in real-time systems. EBAI is based on worst-case interference time(WCIT), which considers both the release jitter and blocking time of the task. We improved the efficiency of the three existing tests and provided a comprehensive summary of related research results in the field. Abundant experiments were conducted to compare EBAI with other related results. Our evaluation showed that in certain cases, the runtime gain achieved using our analysis method may exceed 73% compared to the stateof-the-art schedulability test. Furthermore, the benefits obtained from our tests grew with the number of tasks, reaching a level suitable for practical application. EBAI is oriented to the five-tuple real-time task model with stronger expression ability and possesses a low runtime overhead. These characteristics make it applicable in various real-time systems such as spacecraft, autonomous vehicles, industrial robots, and traffic command systems.
This study addresses the resilient sliding mode control(SMC) problem for two-dimensional cyber-physical systems(2D CPSs) characterized by the Roesser model under denial-of-service attack(DoSA), which can interfere wit...
详细信息
This study addresses the resilient sliding mode control(SMC) problem for two-dimensional cyber-physical systems(2D CPSs) characterized by the Roesser model under denial-of-service attack(DoSA), which can interfere with signal transmission over the communication network. First, the DoS-A model is established by introducing constraints on the Do S frequency and duration. Then, based on active or silent attack situations, the considered system is described as a switched mode. Furthermore, together with Lyapunov theory, the average dwell time technique is employed to deduce sufficient criteria that assure the existence of the desired sliding mode controller. Finally, verification examples are provided to show the validity of the established SMC scheme.
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before...
详细信息
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In...
详细信息
Nowadays, large warehouses operate in an unmanned way by using automated guided vehicles (AGVs). In such a system, large number of AGVs perform their transportation tasks concurrently, leading to high probability of c...
详细信息
Nowadays, large warehouses operate in an unmanned way by using automated guided vehicles (AGVs). In such a system, large number of AGVs perform their transportation tasks concurrently, leading to high probability of conflicts. It is very challenging to manage the operations of these AGVs. This paper studies the operation problem of a warehouse where an unloaded AGV can travel under the shelves, which is different from the ones studied in the literature. In this paper, the problem is described by a graphic model. Based on the model, we propose a multi-AGV real-time collaborative operation (MARTCO) method. By this method, each AGV operates autonomously and determines its traveling path itself. We design a number of priority rules and an improved A* algorithm. The AGVs collaborate by applying these rules. Each AGV can dynamically adjust its path by using MARTCO to avoid conflicts. In this way, the method is computationally efficient such that it can deal with the operation of warehouses with more than 100 AGVs. Also, with the improved A* algorithm, the number of returns and nodes to be searched is significantly reduced, which improves the throughput of the system. Large number of experiments are done to verify the proposed method. IEEE
The rapid advancement and proliferation of Cyber-Physical systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ...
详细信息
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical *** basic challenge experienced while designing WSN is in increasing the network lifetime and use of low *** sensor nodes are resour...
详细信息
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical *** basic challenge experienced while designing WSN is in increasing the network lifetime and use of low *** sensor nodes are resource constrained in nature,novel techniques are essential to improve lifetime of nodes in *** energy is considered as an important resource for sensor node which are battery powered *** WSN,energy is consumed mainly while data is being transferred among nodes in the *** research works are carried out focusing on preserving energy of nodes in the network and made network to live ***,this network is threatened by attacks like vampire attack where the network is loaded by fake ***,Dual Encoding Recurrent Neural network(DERNNet)is proposed for classifying the vampire nodes s node in the ***,the Grey Wolf Optimization(GWO)algorithm helps for transferring the data by determining best solutions to optimally select the aggregation points;thereby maximizing battery/lifetime of the network *** proposed method is evaluated with three standard approaches namely Knowledge and Intrusion Detection based Secure Atom Search Routing(KIDSASR),Risk-aware Reputation-based Trust(RaRTrust)model and Activation Function-based Trusted Neighbor Selection(AF-TNS)in terms of various *** existing methods may lead to wastage of energy due to vampire attack,which further reduce the lifetime and increase average energy consumed in the ***,the proposed DERNNet method achieves 31.4%of routing overhead,23%of end-to-end delay,78.6%of energy efficiency,94.8%of throughput,28.2%of average latency,92.4%of packet delivery ratio,85.2%of network lifetime,and 94.3%of classification accuracy.
In this study, tests were done to see what would happen if hydrogen (H2) and lemon grass oil (LO) were used for a lone-cylinder compression ignition engine as a partial diesel replacement. After starting the trial wit...
详细信息
Images are used widely nowadays. Images are used in many fields such as medicine to terrain mapping. There is a need to compress the images and represent them in shorter form for effective transmission. Several techni...
详细信息
暂无评论