In the drug discovery process, time and costs are the most typical problems resulting from the experimental screening of drug-target interactions (DTIs). To address these limitations, many computational methods have b...
详细信息
While subspace identification methods (SIMs) are appealing due to their simple parameterization for MIMO systems and robust numerical realizations, a comprehensive statistical analysis of SIMs remains an open problem,...
详细信息
Steganography, adopted to hide secret information into multiple digital carriers, has been widely used by lawbreakers for spiteful purposes, posing a threat to cyber security. Recently, VoIP speech (compressed speech)...
详细信息
Industrial network control systems(INCSs) are easy to be targeted by attackers due to their high economic *** of the existing defense methods are deployed at the network boundary,which causes high-security risks to IN...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Industrial network control systems(INCSs) are easy to be targeted by attackers due to their high economic *** of the existing defense methods are deployed at the network boundary,which causes high-security risks to INCS once an attacker enters the *** addition,many existing intrusion detection systems(IDSs) build detection models based on historical *** INCS lacks sufficient historical data,it is difficult to build detection models with high *** this paper,we propose a trust assessment model for INCS based on Fourier series fitting employing concept of zero trust to assess the real-time trust of *** model alerts when INCS has low *** test two data injection attacks in the experiment to prove the effectiveness of our approach.
This paper proposes the development strategy for Intelligent manufacturing transformation, with the help of both SWOT analysis and AHP analysis, in the case of focusing on the Jilin city Automobile Industry. Firstly f...
详细信息
Grid-forming (GFM) inverter has been proposed as a practical solution for improving the stability and resilience of modern power systems. However, the GFM inverter exhibits low inertia characteristic and is susceptibl...
详细信息
Characterization of the velocity and concentration of pneumatically conveyed particles in the upstream of the waveguide protruded into the flow is essential for measuring the mass flow rate and size distribution of pa...
详细信息
Smart grid,as one of the largest evolutionary critical infrastructures,witnesses the deep integration of cyber technologies and physical ***,recent events show that the vulnerabilities exposed in the cyber side and th...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Smart grid,as one of the largest evolutionary critical infrastructures,witnesses the deep integration of cyber technologies and physical ***,recent events show that the vulnerabilities exposed in the cyber side and the physical side can be exploited to cause coupled and severe ***,the adversaries are able to mask the pernicious physical attack using the cyber attack by compromising the digitized data transmitted to the control *** cooperative cyber-physical attack(CCPA) is stealthy to the current defense *** this article,we propose a cyber-physical defensive mechanism(CPDM) to thwart the *** changing the physical value of the line admittance,the model parameters known by the adversary are not useful anymore,which is the basic idea to design the *** implementation of CPDM depends on the deployment of the distributed flexible AC transmission system(D-FACTS).To reduce the infrastructure cost for the CPDM,we investigate the minimum number of required D-FACTS devices to thwart the *** consider both weak constraints on the CCPA and CPDM and practical limitations for the CCPA and *** each case,we propose a method to compute the optimal deployment of D-FACTS devices,that is,where the DFACTS device should be deployed.
Previously,many studies have illustrated corner blend problem with different parameter *** a few of them take a Pythagorean-hodograph(PH)curve as the transition arc,let alone corresponding real-time interpolation *** ...
详细信息
Previously,many studies have illustrated corner blend problem with different parameter *** a few of them take a Pythagorean-hodograph(PH)curve as the transition arc,let alone corresponding real-time interpolation *** this paper,an integrated corner-transition mixing-interpolation-based scheme(ICMS)is proposed,considering transition error and machine tool ***,the ICMS smooths the sharp corners in a linear path through blending the linear path with G3 continuous PH transition *** obtain optimal PH transition curves globally,the problem of corner smoothing is formulated as an optimization problem with *** order to improve optimization efficiency,the transition error constraint is deduced analytically,so is the curvature extreme of each transition *** being blended with PH transition curves,a linear path has become a blend ***,the ICMS adopts a novel mixed interpolator to process this kind of blend curves by considering machine tool *** mixed interpolator can not only implement jerk-limited feedrate scheduling with critical points detection,but also realize self-switching of two interpolation ***,two patterns are machined with a carving platform based on *** l results show the effectiveness of ICMS.
The moisture and temperature distributions in stored biomass are associated with the self-heating and spontaneous combustion of biomass fuels at biomass-fired power plants. In order to acquire timely and predictive in...
详细信息
暂无评论