In Banach Spaces, we introduce a new improved multi-step iterative algorithm for the fixed points of strongly pseudo-contractive mappings, by proving the convergence for modified Mann iterative sequence, and that the ...
详细信息
Focused on the contradiction between selective pressure and population diversity in the optimization algorithm using hybrid evolutionary mechanisms, this paper proposes a membrane image threshold segmentation algorith...
详细信息
With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds th...
With the rapid development of computer network, multimedia technology has gradually spread throughout all aspects of people's life. This article, based on the concept and characteristics of multimedia, expounds the application of multimedia technology and the trend of future development. It makes a heavy analysis of multimedia teaching and analyses the meaning and advantage of multimedia teaching.
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social produc...
In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.
Bus driver rostering is a world-wide problem, which is NP-hard. Two objectives exist in the problem: (1) minimizing the number of drivers;(2) minimizing excess workload of each driver and balancing excess workload amo...
详细信息
The context of objects can provide auxiliary discrimination beyond objects. However, this effective information has not been fully explored. In this paper, we propose Tri-level Combination for image Representation (Tr...
详细信息
This technical note deals with a modified algebraic Riccati equation (MARE) and its corresponding inequality and difference equation, which arise in modified optimal control and filtering problems and are introduced i...
详细信息
In the past nearly two decades, DNA self-assembly technology as a promising technology, a body of laboratory work has been emerged in an endless stream. Single-stranded DNA tile (SST) assembly provides a simple, modul...
详细信息
This paper presents an adaptive differential evolution approach (DEMS for short) for the maximal synchronization between two most popular transit modes (i.e., bus and metro). Given a metro station, suppose the timetab...
详细信息
暂无评论