Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t...Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.展开更多
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov...We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.展开更多
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity.展开更多
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati...This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm.展开更多
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo...The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.展开更多
To analyze the influence of time synchronization error,phase synchronization error,frequency synchronization error,internal delay of the transceiver system,and range error and angle error between the unit radars on th...To analyze the influence of time synchronization error,phase synchronization error,frequency synchronization error,internal delay of the transceiver system,and range error and angle error between the unit radars on the target detection performance,firstly,a spatial detection model of distributed high-frequency surface wave radar(distributed-HFSWR)is established in this paper.In this model,a method for accurate extraction of direct wave spectrum based on curve fitting is proposed to obtain accurate system internal delay and frequency synchronization error under complex electromagnetic environment background and low signal to noise ratio(SNR),and to compensate for the shift of range and Doppler frequency caused by time-frequency synchronization error.The direct wave component is extracted from the spectrum,the range estimation error and Doppler estimation error are reduced by the method of curve fitting,and the fitting accuracy of the parameters is improved.Then,the influence of frequency synchronization error on target range and radial Doppler velocity is quantitatively analyzed.The relationship between frequency synchronization error and radial Doppler velocity shift and range shift is given.Finally,the system synchronization parameters of the trial distributed-HFSWR are obtained by the proposed spectrum extraction method based on curve fitting,the experimental data is compensated to correct the shift of the target,and finally the correct target parameter information is obtained.Simulations and experimental results demonstrate the superiority and correctness of the proposed method,theoretical derivation and detection model proposed in this paper.展开更多
Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost prob...Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost problems of both hardware and power consumption.In this paper,we investigate multiple reconfigurable intelligent surfaces(RISs)aided cell-free systems where RISs are introduced to improve spectrum efficiency in an energy-efficient way.To overcome the centralized high complexity and avoid frequent information exchanges,a cooperative distributed beamforming design is proposed to maximize the weighted sum-rate performance.In particular,the alternating optimization method is utilized with the distributed closed-form solution of active beamforming being derived locally at access points,and phase shifts are obtained centrally based on the Riemannian conjugate gradient(RCG)manifold method.Simulation results verify the effectiveness of the proposed design whose performance is comparable to the centralized scheme and show great superiority of the RISs-aided system over the conventional cellular and cell-free system.展开更多
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati...The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.展开更多
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema...In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.展开更多
As a matured technique used in many fields,the distributed computer system is still a new management method for the aeronautical electrical power distribution system in our country. In this paper, a novel aircraft ele...As a matured technique used in many fields,the distributed computer system is still a new management method for the aeronautical electrical power distribution system in our country. In this paper, a novel aircraft electrical power distribution system based on the distributed computer system is proposed. The principles, features and structure of the aircraft electrical power distribution system and the distributed computer system named electrical load management system (ELMS) are studied. The ELMS composed of four electrical load management centers (ELMCs) and two power source processors (PSPs) operates in the 1553B buses. Principles of the ELMCs and the PSPs are introduced. With the application of the distributed computer system, the aircraft electrical power distribution system is simple, adaptable and flexible.展开更多
The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-trigge...The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure.展开更多
In this paper,DOA and subarray-interval estimation are considered and applied to arbitrarily distributed unmanned aerial vehicle(UAV)swarm system,in which multiple small UAVs containing uniform linear array(ULA)are di...In this paper,DOA and subarray-interval estimation are considered and applied to arbitrarily distributed unmanned aerial vehicle(UAV)swarm system,in which multiple small UAVs containing uniform linear array(ULA)are divided by unknown intervals because of dynamic moving.Three parameters are taken to indicate the steering vector,namely,the direction of arrivals(DOAs)of target users,the intervals of UAVs,and the orientation angles of UAVs.The orientation angles are first estimated with an auxiliary user and the DOAs are obtained through a search free rooting method,despite the intervals among the UAVs.Afterwards,the intervals among UAVs can also be calculated via exhaustive when the number of target users are no less than three.We further develop a low-complex method to reduce the computational complexity during subarray-interval estimation.The deterministic Cramér-Rao bound(CRB)of the DOA,orientation angle and subarray-interval can be inferred in a closed form.Eventually,numerical instances are cited to verify the research results.展开更多
The paper investigates applicability of the developed high-level model and technology for solution of diverse problems in large distributed dynamic systems which can provide sufficient awareness of their structures,or...The paper investigates applicability of the developed high-level model and technology for solution of diverse problems in large distributed dynamic systems which can provide sufficient awareness of their structures,organization,and functionalities.After the review of meanings of awareness and existing approaches for its expression and support,the paper shows application of the Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)for very practical awareness solutions in large distributed dynamic systems,with obtaining any knowledge from any point inside or outside the system.The self-evolving,self-replicating,and self-recovering scenario code in SGL can effectively supervise distributed systems under any circumstances including rapidly changing number of their elements.Examples are provided in SGL for distributed networked systems showing how in any node any information about other nodes and links,including the whole system,can be obtained by using network requesting patterns based on recursive scenarios combining forward and backward network matching and coverage.The returned results may be automatically organized in networked patterns too.The presented exemplary solutions are parallel and fully distributed,without the need of using vulnerable centralized resources,also very compact.This can be explained by fundamentally different philosophy and ideology of SGT which is not based on traditional partitioned systems representation and multiple agent communications.On the contrary,SGT and its basic language supervise and control distributed systems by holistic self-spreading recursive code in wavelike,virus-like,and even“soul-like”mode.展开更多
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achi...This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achieve the optimization o players' objective functions while restricting their actions within required non-empty, convex and compact domains. In addition, a leader-following consensus protocol, in which quantized informa tion flows are utilized, is employed for information sharing among players. More specifically, logarithmic quantizers and uniform quantizers are investigated under both undirected and connected communication graphs and strongly connected digraphs, respec tively. Through Lyapunov stability analysis, it is shown that play ers' actions can be steered to a neighborhood of the Nash equilib rium with logarithmic and uniform quantizers, and the quanti fied convergence error depends on the parameter of the quan tizer for both undirected and directed cases. A numerical exam ple is given to verify the theoretical results.展开更多
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural ...False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural networkmodels to detect FDIA attacks.However,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection model.To address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative confrontation.Furthermore,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal characteristics.Finally,efficient FDIA attack samples can be sequentially generated through interactive adversarial learning.Extensive simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.展开更多
Glacier disasters occur frequently in alpine regions around the world,but the current conventional geological disaster measurement technology cannot be directly used for glacier disaster measurement.Hence,in this stud...Glacier disasters occur frequently in alpine regions around the world,but the current conventional geological disaster measurement technology cannot be directly used for glacier disaster measurement.Hence,in this study,a distributed multi-sensor measurement system for glacier deformation was established by integrating piezoelectric sensing,coded sensing,attitude sensing technology and wireless communication technology.The traditional Modbus protocol was optimized to solve the problem of data identification confusion of different acquisition nodes.Through indoor wireless transmission,adaptive performance analysis,error measurement experiment and landslide simulation experiment,the performance of the measurement system was analyzed and evaluated.Using unmanned aerial vehicle technology,the reliability and effectiveness of the measurement system were verified on the site of Galongla glacier in southeastern Tibet,China.The results show that the mean absolute percentage errors were only 1.13%and 2.09%for the displacement and temperature,respectively.The distributed glacier deformation real-time measurement system provides a new means for the assessment of the development process of glacier disasters and disaster prevention and mitigation.展开更多
This paper presents a comprehensive study that includes the sizing and power flow by series and parallel inverters in a distributed generation system(DGs)that integrates the system of hybrid wind photovoltaic with a u...This paper presents a comprehensive study that includes the sizing and power flow by series and parallel inverters in a distributed generation system(DGs)that integrates the system of hybrid wind photovoltaic with a unified power quality conditioner(UPQC).In addition to supplying active power to the utility grid,the system of hybrid wind photovoltaic functions as a UPQC,compensating reactive power and suppressing the harmonic load currents.Additionally,the load is supplied with harmonic-free,balanced and regulated output voltages.Since PVWind-UPQC is established on a dual compensation scheme,the series inverter works like a sinusoidal current source,while the parallel inverter works like a sinusoidal voltage source.Consequently,a smooth alteration from interconnected operating modes to island operating modes and vice versa can be achieved without load voltage transients.Since PV-Wind-UPQC inverters handle the energy generated through the hybrid wind photovoltaic system and the energy demanded through the load,the converters should be sized cautiously.A detailed study of the flow of power via the PV-Wind-UPQC is imperative to gain a complete understanding of the system operation and the proper design of the converters.Thus,curves that allow the sizing of the power converters according to the power flow via the converters are presented and discussed.Simulation results are presented to assess both steady state and dynamic performances of the grid connected hybrid system of PV-Wind-UPQC.This investigation is verified by simulating and analyzing the results with Matlab/Simulink.展开更多
In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction ...In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction of distributed scatterers in Distributed Scatterers InSAR(DS-InSAR)has significantly expanded the application scenarios of InSAR geodetic measurement by increasing the number of measurement points.This study traces the history of DS-InSAR,presents the definition and characteristics of distributed scatterers,and focuses on exploring the relationships and distinctions among proposed algorithms in two crucial steps:statistically homogeneous pixel selection and phase optimization.Additionally,the latest research progress in this field is tracked and the possible development direction in the future is discussed.Through simulation experiments and two real InSAR case studies,the proposed algorithms are compared and verified,and the advantages of DS-InSAR in deformation measurement practice are demonstrated.This work not only offers insights into current trends and focal points for theoretical research on DS-InSAR but also provides practical cases and guidance for applied research.展开更多
This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzz...This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzzy model. To save the network communication burden, a distributed dynamic event-triggered mechanism is developed to restrain the information update. Besides, random packet dropouts following the Bernoulli distribution are assumed to occur in sensor to controller channels, where the triggered control input is analyzed via an equivalent method containing a new stochastic variable. By establishing the mode-dependent Lyapunov–Krasovskii functional with augmented terms, the finite-time boundness of the error system limited to strict dissipativity is studied. As a result of the help of an extended reciprocally convex matrix inequality technique, less conservative criteria in terms of linear matrix inequalities are deduced to calculate the desired control gains. Finally, two examples in regard to practical systems are provided to display the effectiveness of the proposed theory.展开更多
Recently,research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase.Physical expansion limits exist for tradition...Recently,research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase.Physical expansion limits exist for traditional standalone storage systems,such as I/O and file system capacity.However,the existing distributed storage system does not consider where data is consumed and is more focused on data dissemination and optimizing the lookup cost of data location.And this leads to system performance degradation due to low locality occurring in a Wide Area Network(WAN)environment with high network latency.This problem hinders deploying distributed storage systems to multiple data centers over WAN.It lowers the scalability of distributed storage systems to accommodate data storage needs.This paper proposes a method for distributing data in a WAN environment considering network latency and data locality to solve this problem and increase overall system performance.The proposed distributed storage method monitors data utilization and locality to classify data temperature as hot,warm,and cold.With assigned data temperature,the proposed algorithm adaptively selects the appropriate data center and places data accordingly to overcome the excess latency from the WAN environment,leading to overall system performance degradation.This paper also conducts simulations to evaluate the proposed and existing distributed storage methods.The result shows that our proposed method reduced latency by 38%compared to the existing method.Therefore,the proposed method in this paper can be used in large-scale distributed storage systems over a WAN environment to improve latency and performance compared to existing methods,such as consistent hashing.展开更多
基金the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number 223202.
文摘Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women.
基金Project supported by the National Natural Science Foundation of China (Grant No.62073045)。
文摘We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.
文摘The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity.
基金supported in part by the National Natural Science Foundation of China(62073189,62173207)the Taishan Scholar Project of Shandong Province(tsqn202211129)。
文摘This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm.
文摘The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
基金supported by the National Natural Science Foundation of China(61701140).
文摘To analyze the influence of time synchronization error,phase synchronization error,frequency synchronization error,internal delay of the transceiver system,and range error and angle error between the unit radars on the target detection performance,firstly,a spatial detection model of distributed high-frequency surface wave radar(distributed-HFSWR)is established in this paper.In this model,a method for accurate extraction of direct wave spectrum based on curve fitting is proposed to obtain accurate system internal delay and frequency synchronization error under complex electromagnetic environment background and low signal to noise ratio(SNR),and to compensate for the shift of range and Doppler frequency caused by time-frequency synchronization error.The direct wave component is extracted from the spectrum,the range estimation error and Doppler estimation error are reduced by the method of curve fitting,and the fitting accuracy of the parameters is improved.Then,the influence of frequency synchronization error on target range and radial Doppler velocity is quantitatively analyzed.The relationship between frequency synchronization error and radial Doppler velocity shift and range shift is given.Finally,the system synchronization parameters of the trial distributed-HFSWR are obtained by the proposed spectrum extraction method based on curve fitting,the experimental data is compensated to correct the shift of the target,and finally the correct target parameter information is obtained.Simulations and experimental results demonstrate the superiority and correctness of the proposed method,theoretical derivation and detection model proposed in this paper.
文摘Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost problems of both hardware and power consumption.In this paper,we investigate multiple reconfigurable intelligent surfaces(RISs)aided cell-free systems where RISs are introduced to improve spectrum efficiency in an energy-efficient way.To overcome the centralized high complexity and avoid frequent information exchanges,a cooperative distributed beamforming design is proposed to maximize the weighted sum-rate performance.In particular,the alternating optimization method is utilized with the distributed closed-form solution of active beamforming being derived locally at access points,and phase shifts are obtained centrally based on the Riemannian conjugate gradient(RCG)manifold method.Simulation results verify the effectiveness of the proposed design whose performance is comparable to the centralized scheme and show great superiority of the RISs-aided system over the conventional cellular and cell-free system.
文摘The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.
文摘In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.
文摘As a matured technique used in many fields,the distributed computer system is still a new management method for the aeronautical electrical power distribution system in our country. In this paper, a novel aircraft electrical power distribution system based on the distributed computer system is proposed. The principles, features and structure of the aircraft electrical power distribution system and the distributed computer system named electrical load management system (ELMS) are studied. The ELMS composed of four electrical load management centers (ELMCs) and two power source processors (PSPs) operates in the 1553B buses. Principles of the ELMCs and the PSPs are introduced. With the application of the distributed computer system, the aircraft electrical power distribution system is simple, adaptable and flexible.
基金supported in part by the National Key Research and Development Program of China(2021YFB1714800)the National Natural Science Foundation of China(62088101,61925303,62173034,U20B2073)+1 种基金the Natural Science Foundation of Chongqing(2021ZX4100027)the Deutsche Forschungsgemeinschaft(DFG,German Research Foundation)under Germanys Excellence Strategy—EXC 2075-390740016(468094890)。
文摘The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure.
基金supported by National Natural Science Foundation of China(No.62101601)。
文摘In this paper,DOA and subarray-interval estimation are considered and applied to arbitrarily distributed unmanned aerial vehicle(UAV)swarm system,in which multiple small UAVs containing uniform linear array(ULA)are divided by unknown intervals because of dynamic moving.Three parameters are taken to indicate the steering vector,namely,the direction of arrivals(DOAs)of target users,the intervals of UAVs,and the orientation angles of UAVs.The orientation angles are first estimated with an auxiliary user and the DOAs are obtained through a search free rooting method,despite the intervals among the UAVs.Afterwards,the intervals among UAVs can also be calculated via exhaustive when the number of target users are no less than three.We further develop a low-complex method to reduce the computational complexity during subarray-interval estimation.The deterministic Cramér-Rao bound(CRB)of the DOA,orientation angle and subarray-interval can be inferred in a closed form.Eventually,numerical instances are cited to verify the research results.
文摘The paper investigates applicability of the developed high-level model and technology for solution of diverse problems in large distributed dynamic systems which can provide sufficient awareness of their structures,organization,and functionalities.After the review of meanings of awareness and existing approaches for its expression and support,the paper shows application of the Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)for very practical awareness solutions in large distributed dynamic systems,with obtaining any knowledge from any point inside or outside the system.The self-evolving,self-replicating,and self-recovering scenario code in SGL can effectively supervise distributed systems under any circumstances including rapidly changing number of their elements.Examples are provided in SGL for distributed networked systems showing how in any node any information about other nodes and links,including the whole system,can be obtained by using network requesting patterns based on recursive scenarios combining forward and backward network matching and coverage.The returned results may be automatically organized in networked patterns too.The presented exemplary solutions are parallel and fully distributed,without the need of using vulnerable centralized resources,also very compact.This can be explained by fundamentally different philosophy and ideology of SGT which is not based on traditional partitioned systems representation and multiple agent communications.On the contrary,SGT and its basic language supervise and control distributed systems by holistic self-spreading recursive code in wavelike,virus-like,and even“soul-like”mode.
基金supported by the National Natural Science Foundation of China (NSFC)(62222308, 62173181, 62073171, 62221004)the Natural Science Foundation of Jiangsu Province (BK20200744, BK20220139)+3 种基金Jiangsu Specially-Appointed Professor (RK043STP19001)the Young Elite Scientists Sponsorship Program by CAST (2021QNRC001)1311 Talent Plan of Nanjing University of Posts and Telecommunicationsthe Fundamental Research Funds for the Central Universities (30920032203)。
文摘This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achieve the optimization o players' objective functions while restricting their actions within required non-empty, convex and compact domains. In addition, a leader-following consensus protocol, in which quantized informa tion flows are utilized, is employed for information sharing among players. More specifically, logarithmic quantizers and uniform quantizers are investigated under both undirected and connected communication graphs and strongly connected digraphs, respec tively. Through Lyapunov stability analysis, it is shown that play ers' actions can be steered to a neighborhood of the Nash equilib rium with logarithmic and uniform quantizers, and the quanti fied convergence error depends on the parameter of the quan tizer for both undirected and directed cases. A numerical exam ple is given to verify the theoretical results.
基金supported in part by the the Natural Science Foundation of Shanghai(20ZR1421600)Research Fund of Guangxi Key Lab of Multi-Source Information Mining&Security(MIMS21-M-02).
文摘False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural networkmodels to detect FDIA attacks.However,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection model.To address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative confrontation.Furthermore,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal characteristics.Finally,efficient FDIA attack samples can be sequentially generated through interactive adversarial learning.Extensive simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.
基金funded by National Key R&D Program of China((Nos.2022YFC3003403 and 2018YFC1505203)Key Research and Development Program of Tibet Autonomous Region(XZ202301ZY0039G)+1 种基金Natural Science Foundation of Hebei Province(No.F2021201031)Geological Survey Project of China Geological Survey(No.DD20221747)。
文摘Glacier disasters occur frequently in alpine regions around the world,but the current conventional geological disaster measurement technology cannot be directly used for glacier disaster measurement.Hence,in this study,a distributed multi-sensor measurement system for glacier deformation was established by integrating piezoelectric sensing,coded sensing,attitude sensing technology and wireless communication technology.The traditional Modbus protocol was optimized to solve the problem of data identification confusion of different acquisition nodes.Through indoor wireless transmission,adaptive performance analysis,error measurement experiment and landslide simulation experiment,the performance of the measurement system was analyzed and evaluated.Using unmanned aerial vehicle technology,the reliability and effectiveness of the measurement system were verified on the site of Galongla glacier in southeastern Tibet,China.The results show that the mean absolute percentage errors were only 1.13%and 2.09%for the displacement and temperature,respectively.The distributed glacier deformation real-time measurement system provides a new means for the assessment of the development process of glacier disasters and disaster prevention and mitigation.
文摘This paper presents a comprehensive study that includes the sizing and power flow by series and parallel inverters in a distributed generation system(DGs)that integrates the system of hybrid wind photovoltaic with a unified power quality conditioner(UPQC).In addition to supplying active power to the utility grid,the system of hybrid wind photovoltaic functions as a UPQC,compensating reactive power and suppressing the harmonic load currents.Additionally,the load is supplied with harmonic-free,balanced and regulated output voltages.Since PVWind-UPQC is established on a dual compensation scheme,the series inverter works like a sinusoidal current source,while the parallel inverter works like a sinusoidal voltage source.Consequently,a smooth alteration from interconnected operating modes to island operating modes and vice versa can be achieved without load voltage transients.Since PV-Wind-UPQC inverters handle the energy generated through the hybrid wind photovoltaic system and the energy demanded through the load,the converters should be sized cautiously.A detailed study of the flow of power via the PV-Wind-UPQC is imperative to gain a complete understanding of the system operation and the proper design of the converters.Thus,curves that allow the sizing of the power converters according to the power flow via the converters are presented and discussed.Simulation results are presented to assess both steady state and dynamic performances of the grid connected hybrid system of PV-Wind-UPQC.This investigation is verified by simulating and analyzing the results with Matlab/Simulink.
基金National Natural Science Foundation of China(No.42374013)National Key Research and Development Program of China(Nos.2019YFC1509201,2021YFB3900604-03)。
文摘In the past two decades,extensive and in-depth research has been conducted on Time Series InSAR technology with the advancement of high-performance SAR satellites and the accumulation of big SAR data.The introduction of distributed scatterers in Distributed Scatterers InSAR(DS-InSAR)has significantly expanded the application scenarios of InSAR geodetic measurement by increasing the number of measurement points.This study traces the history of DS-InSAR,presents the definition and characteristics of distributed scatterers,and focuses on exploring the relationships and distinctions among proposed algorithms in two crucial steps:statistically homogeneous pixel selection and phase optimization.Additionally,the latest research progress in this field is tracked and the possible development direction in the future is discussed.Through simulation experiments and two real InSAR case studies,the proposed algorithms are compared and verified,and the advantages of DS-InSAR in deformation measurement practice are demonstrated.This work not only offers insights into current trends and focal points for theoretical research on DS-InSAR but also provides practical cases and guidance for applied research.
基金Project supported by the National Natural Science Foundation of China (Grant No. 62263005)Guangxi Natural Science Foundation (Grant No. 2020GXNSFDA238029)+2 种基金Laboratory of AI and Information Processing (Hechi University), Education Department of Guangxi Zhuang Autonomous Region (Grant No. 2022GXZDSY004)Innovation Project of Guangxi Graduate Education (Grant No. YCSW2023298)Innovation Project of GUET Graduate Education (Grant Nos. 2022YCXS149 and 2022YCXS155)。
文摘This paper is concerned with the finite-time dissipative synchronization control problem of semi-Markov switched cyber-physical systems in the presence of packet losses, which is constructed by the Takagi–Sugeno fuzzy model. To save the network communication burden, a distributed dynamic event-triggered mechanism is developed to restrain the information update. Besides, random packet dropouts following the Bernoulli distribution are assumed to occur in sensor to controller channels, where the triggered control input is analyzed via an equivalent method containing a new stochastic variable. By establishing the mode-dependent Lyapunov–Krasovskii functional with augmented terms, the finite-time boundness of the error system limited to strict dissipativity is studied. As a result of the help of an extended reciprocally convex matrix inequality technique, less conservative criteria in terms of linear matrix inequalities are deduced to calculate the desired control gains. Finally, two examples in regard to practical systems are provided to display the effectiveness of the proposed theory.
基金This research was supported by the Chung-Ang University Graduate Research Scholarship in 2021.This study was carried out with the support of‘R&D Program for Forest Science Technology(Project No.2021338C10-2223-CD02)’provided by Korea Forest Service(Korea Forestry Promotion Institute).
文摘Recently,research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase.Physical expansion limits exist for traditional standalone storage systems,such as I/O and file system capacity.However,the existing distributed storage system does not consider where data is consumed and is more focused on data dissemination and optimizing the lookup cost of data location.And this leads to system performance degradation due to low locality occurring in a Wide Area Network(WAN)environment with high network latency.This problem hinders deploying distributed storage systems to multiple data centers over WAN.It lowers the scalability of distributed storage systems to accommodate data storage needs.This paper proposes a method for distributing data in a WAN environment considering network latency and data locality to solve this problem and increase overall system performance.The proposed distributed storage method monitors data utilization and locality to classify data temperature as hot,warm,and cold.With assigned data temperature,the proposed algorithm adaptively selects the appropriate data center and places data accordingly to overcome the excess latency from the WAN environment,leading to overall system performance degradation.This paper also conducts simulations to evaluate the proposed and existing distributed storage methods.The result shows that our proposed method reduced latency by 38%compared to the existing method.Therefore,the proposed method in this paper can be used in large-scale distributed storage systems over a WAN environment to improve latency and performance compared to existing methods,such as consistent hashing.