Node Importance Evaluation of Cyber‐Physical System under Cyber‐Attacks Spreading [PDF]
The study of cyber‐attacks, and in particular the spread of attack on the power cyber‐physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber‐attack propagation scenario are of great significance for improving the reliability and survivability of the power system.
Xin-Rui Liu, Yuan Meng, Peng Chang
openaire +2 more sources
A identification method for critical causes of lifting injuries based on topological potential
In view of the deficiency that the traditional importance ranking method cannot be used to objectively and comprehensively evaluate the importance of the causes of hoisting injuries, an importance ranking method based on topological potential is proposed
Yingliu Yang, Lianghai Jin
doaj +2 more sources
An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane
In scientific domains such as high-energy particle physics and genomics, the quantity of high-speed data traffic generated may far exceed the storage throughput and be unable to be in time stored in the current node.
Shoujiang Dang, Rui Han
doaj +1 more source
Learning temporal attention in dynamic graphs with bilinear interactions.
Reasoning about graphs evolving over time is a challenging concept in many domains, such as bioinformatics, physics, and social networks. We consider a common case in which edges can be short term interactions (e.g., messaging) or long term structural ...
Boris Knyazev +2 more
doaj +1 more source
Weather-Aware Wake-Up of Sleeping Cyber-Physical IoT Nodes
Cyber-physical IoT nodes located in environments which are resource-constrained and physically hard to access, like the Arctic tundra, must achieve long operational lifetimes from a single battery and report data over data networks. The nodes sleep most of the time, and only wake up to perform mission tasks, including reporting data.
Kristensen, Steffen Ole Randrup +4 more
openaire +2 more sources
Design and implementation of T0 signal monitoring system of CSNS multi-physical spectrometer
Background The high accuracy and high stability of the T0 signal, taking from initial proton target time, are the prerequisite and basis for the efficient operation of the multi-physics spectrometer of Chinese spallation neutron source (CSNS).
YAN Ze +3 more
doaj +1 more source
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release
Many data analysis applications rely on social networks that contain abundant information about individuals. Nevertheless, these applications can leak private information about individuals in social networks.
Hong Zhu, Xin Zuo, Meiyi Xie
doaj +1 more source
H-TOSSIM: Extending TOSSIM with Physical Nodes
As the development of Wireless Sensor Network (WSN), software testing for WSN-based applications be-comes more and more important. Simulation testing is an important approach to WSN-based software testing, and TOSSIM is the most widely used simulation testing tool targeted at TinyOS which is the most popular operating system nowadays.
Wenjun LI +3 more
openaire +2 more sources
HyperTrack: Neural Combinatorics for High Energy Physics [PDF]
Combinatorial inverse problems in high energy physics span enormous algorithmic challenges. This work presents a new deep learning driven clustering algorithm that utilizes a space-time non-local trainable graph constructor, a graph neural network, and a
Mieskolainen Mikael
doaj +1 more source
Dirac cone protected by non-symmorphic symmetry and three-dimensional Dirac line node in ZrSiS [PDF]
Materials harbouring exotic quasiparticles, such as massless Dirac and Weyl fermions, have garnered much attention from physics and material science communities due to their exceptional physical properties such as ultra-high mobility and extremely large ...
L. Schoop +9 more
semanticscholar +1 more source

