Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
We describe NLSExplorer, an interpretable approach for nuclear localization signal (NLS) prediction. By utilizing the extracted information on nuclear-specific sites from the protein language model to assist in NLS de...
详细信息
We describe NLSExplorer, an interpretable approach for nuclear localization signal (NLS) prediction. By utilizing the extracted information on nuclear-specific sites from the protein language model to assist in NLS detection, NLSExplorer achieves superior performance with greater than 10% improvement in the F1 score compared with existing methods on benchmark datasets and highlights other nuclear transport segments. We applied NLSExplorer to the nucleus-localized proteins in the Swiss-Prot database to extract valuable segments. A comprehensive analysis of these segments revealed a potential NLS landscape and uncovered features of nuclear transport segments across 416 species. This study introduces a powerful tool for exploring the NLS universe and provides a versatile network that can efficiently detect characteristic domains and motifs.
Column Generation (CG) technique is popularly applied in solving the crew scheduling problem of large size, which is generally modeled as an Integer Linear Programming (ILP) problem. The traditional CG algorithms for ...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic commun...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol *** this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication *** the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol ***,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling ***,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.
When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical ...
详细信息
When chaotic systems are implemented on finite precision machines, it will lead to the problem of dynamical degradation. Aiming at this problem, most previous related works have been proposed to improve the dynamical degradation of low-dimensional chaotic maps. This paper presents a novel method to construct high-dimensional digital chaotic systems in the domain of finite computing precision. The model is proposed by coupling a high-dimensional digital system with a continuous chaotic system. A rigorous proof is given that the controlled digital system is chaotic in the sense of Devaney's definition of chaos. Numerical experimental results for different high-dimensional digital systems indicate that the proposed method can overcome the degradation problem and construct high-dimensional digital chaos with complicated dynamical properties. Based on the construction method, a kind of pseudorandom number generator (PRNG) is also proposed as an application.
With the wide use of power conversion devices - 'nonlinear loads' - many harmonic currents are being injected into the power grid. Shunt Active Power Filters (SAPF) are the power electronic equipment to compen...
详细信息
This paper is presented to examine and improve the performance of the torque ripple suppression for direct torque controlled permanent magnet synchronous motor by using fuzzy control method. On the basis of analyzing ...
详细信息
Transient faults are hard to be detected and located due to their unpredictable nature and short duration, and they are the dominant causations of system failures, which makes it necessary to consider transient fault-...
详细信息
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. T...
详细信息
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. The followers can arrive at any predetermined configuration by regulating the behaviors of the leaders. Some sufficient and necessary conditions are proposed for the controllability of discrete-time multi-agent systems with multiple leaders. Moreover, the case with isolated agents is discussed. Numerical examples and simulations are proposed to illustrate the theoretical results we established.
A novel method of designing a penta-band omnidirectional low-profile antenna with independent band control is proposed. Single-band, dual-band, tri-band, quad-band, and penta-band antennas are investigated, respective...
详细信息
暂无评论