Results 21 to 30 of about 228,850 (260)

Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles

open access: yesSensors, 2021
This paper introduces an integrated IoT architecture to handle the problem of cyber attacks based on a developed deep neural network (DNN) with a rectified linear unit in order to provide reliable and secure online monitoring for automated guided ...
Mahmoud Elsisi, Minh-Quang Tran
doaj   +1 more source

Thermal control of coke furnace by data-driven approach

open access: yesDigital Chemical Engineering, 2022
To achieve efficient and stable coke furnace operation, we developed an operation guidance system to reduce the variance of net coking time (NCT). A control algorithm that predicts the future NCT by locally weighted regression using the individual ...
Yoshinari Hashimoto, Hiroto Kase
doaj   +1 more source

No-Wait Job Shop Scheduling Using a Population-Based Iterated Greedy Algorithm

open access: yesAlgorithms, 2021
When no-wait constraint holds in job shops, a job has to be processed with no waiting time from the first to the last operation, and the start time of a job is greatly restricted. Using key elements of the iterated greedy algorithm, this paper proposes a
Mingming Xu   +2 more
doaj   +1 more source

Defect Detection in Striped Images Using a One-Dimensional Median Filter

open access: yesApplied Sciences, 2020
Defect detection is a key element of quality assurance in many modern manufacturing processes. Defect detection methods, however, often involve a great deal of time and manual work.
Wei-Chen Lee, Pei-Ling Tai
doaj   +1 more source

A Method for Fault Tolerant Localization of Heterogeneous Wireless Sensor Networks

open access: yesIEEE Access, 2021
Location information of nodes in Wireless Sensor Networks (WSN) is essential to identify the origins of events and to act on them. Several localization algorithms are developed for this purpose.
Soumya J. Bhat, K. V. Santhosh
doaj   +1 more source

A research on early warning method of Distribution Network Cyber Physical System [PDF]

open access: yesE3S Web of Conferences, 2021
The high integration of cyber and physics is the development trend of intelligent distribution network in the future, but the cyber system not only supports the stable operation of the physical system, also brings some security risks to the cyber ...
Chen Feng   +4 more
doaj   +1 more source

Phase Retrieval Based on Shaped Incoherent Sources

open access: yesSensors, 2023
Current ghost imaging phase reconstruction schemes require either complex optical systems, iterative algorithms, Fourier transform steps, or entangled photon pairs.
Ziyan Chen, Jing Cheng, Heng Wu
doaj   +1 more source

Distributed State Estimation for Dynamic Positioning Systems with Uncertain Disturbances and Transmission Time Delays

open access: yesComplexity, 2020
The dynamic positioning system of unmanned underwater vehicles (UUVs) is a complex and large-scale system mainly due to the nonlinear dynamics, uncertainty in model parameters, and external disturbances.
Li Liu   +6 more
doaj   +1 more source

Adaptive Process Management in Cyber-Physical Domains [PDF]

open access: yes, 2017
The increasing application of process-oriented approaches in new challenging cyber-physical domains beyond business computing (e.g., personalized healthcare, emergency management, factories of the future, home automation, etc.) has led to reconsider the ...
Marrella, Andrea, Mecella, Massimo
core   +1 more source

Evaluation of Critical Node Groups in Cyber-Physical Power Systems Based on Pinning Control Theory

open access: yesIEEE Access, 2022
Blackouts have severely damaged cyber-physical power systems over the years, resulting in malfunctions that have rapidly spread within the electrical network. Selecting a set of critical nodes for human control can avoid similar situations.
Yan Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy