As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
In many Eastern and Western countries,falling birth rates have led to the gradual aging of society.Older adults are often left alone at home or live in a long-term care center,which results in them being susceptible t...In many Eastern and Western countries,falling birth rates have led to the gradual aging of society.Older adults are often left alone at home or live in a long-term care center,which results in them being susceptible to unsafe events(such as falls)that can have disastrous consequences.However,automatically detecting falls fromvideo data is challenging,and automatic fall detection methods usually require large volumes of training data,which can be difficult to acquire.To address this problem,video kinematic data can be used as training data,thereby avoiding the requirement of creating a large fall data set.This study integrated an improved particle swarm optimization method into a double interactively recurrent fuzzy cerebellar model articulation controller model to develop a costeffective and accurate fall detection system.First,it obtained an optical flow(OF)trajectory diagram from image sequences by using the OF method,and it solved problems related to focal length and object offset by employing the discrete Fourier transform(DFT)algorithm.Second,this study developed the D-IRFCMAC model,which combines spatial and temporal(recurrent)information.Third,it designed an IPSO(Improved Particle Swarm Optimization)algorithm that effectively strengthens the exploratory capabilities of the proposed D-IRFCMAC(Double-Interactively Recurrent Fuzzy Cerebellar Model Articulation Controller)model in the global search space.The proposed approach outperforms existing state-of-the-art methods in terms of action recognition accuracy on the UR-Fall,UP-Fall,and PRECIS HAR data sets.The UCF11 dataset had an average accuracy of 93.13%,whereas the UCF101 dataset had an average accuracy of 92.19%.The UR-Fall dataset had an accuracy of 100%,the UP-Fall dataset had an accuracy of 99.25%,and the PRECIS HAR dataset had an accuracy of 99.07%.展开更多
With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas...With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.展开更多
The complex working conditions and nonlinear characteristics of the motor drive control system of industrial robots make it difficult to detect faults.In this paper,a deep learning-based observer,which combines the co...The complex working conditions and nonlinear characteristics of the motor drive control system of industrial robots make it difficult to detect faults.In this paper,a deep learning-based observer,which combines the convolutional neural network(CNN)and the long short-term memory network(LSTM),is employed to approximate the nonlinear driving control system.CNN layers are introduced to extract dynamic features of the data,whereas LSTM layers perform time-sequential prediction of the target system.In terms of application,normal samples are fed into the observer to build an offline prediction model for the target system.The trained CNN-LSTM-based observer is then deployed along with the target system to estimate the system outputs.Online fault detection can be realized by analyzing the residuals.Finally,an application of the proposed fault detection method to a brushless DC motor drive system is given to verify the effectiveness of the proposed scheme.Simulation results indicate the impressive fault detection capability of the presented method for driving control systems of industrial robots.展开更多
The mass and thermal coupling makes the control of the reactive double dividing-wall distillation column(R-DDWDC) an especially challenging issue with a highly interactive nature. With reference to the separation of a...The mass and thermal coupling makes the control of the reactive double dividing-wall distillation column(R-DDWDC) an especially challenging issue with a highly interactive nature. With reference to the separation of an ideal endothermic quaternary reversible reaction with the most unfavorable ranking of relative volatilities(A + B ■ C + D with α_(A)>α_(C)>α_(D)>α_(B)), the operation rationality of the R-DDWDC is studied in this contribution. The four-point single temperature control system leads to great steady-state discrepancies in the compositions of products C and D and the reason stems essentially from the failure in keeping strictly the stoichiometric ratio between reactants A and B. A temperature plus temperature cascade control scheme is then employed to reinforce the stoichiometric ratio control and helps to secure a substantial abatement in the steady-state discrepancies. A temperature difference plus temperature cascade control scheme is finally synthesized and leads even to better performance than the most effective double temperature difference control scheme. These outcomes reveal not only the operation feasibility of the R-DDWDC but also the general significance of the proposed temperature difference plus temperature cascade control scheme to the inferential control of any other complicated distillation columns.展开更多
Cyberattacks targeting industrial control systems(ICS)are becoming more sophisticated and advanced than in the past.A programmable logic controller(PLC),a core component of ICS,controls and monitors sensors and actuat...Cyberattacks targeting industrial control systems(ICS)are becoming more sophisticated and advanced than in the past.A programmable logic controller(PLC),a core component of ICS,controls and monitors sensors and actuators in the field.However,PLC has memory attack threats such as program injection and manipulation,which has long been a major target for attackers,and it is important to detect these attacks for ICS security.To detect PLC memory attacks,a security system is required to acquire and monitor PLC memory directly.In addition,the performance impact of the security system on the PLC makes it difficult to apply to the ICS.To address these challenges,this paper proposes a system to detect PLC memory attacks by continuously acquiring and monitoring PLC memory.The proposed system detects PLC memory attacks by acquiring the program blocks and block information directly from the same layer as the PLC and then comparing them in bytes with previous data.Experiments with Siemens S7-300 and S7-400 PLC were conducted to evaluate the PLC memory detection performance and performance impact on PLC.The experimental results demonstrate that the proposed system detects all malicious organization block(OB)injection and data block(DB)manipulation,and the increment of PLC cycle time,the impact on PLC performance,was less than 1 ms.The proposed system detects PLC memory attacks with a simpler detection method than earlier studies.Furthermore,the proposed system can be applied to ICS with a small performance impact on PLC.展开更多
To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the att...To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the attack path canbe cut off,security threats canbe effectively avoided and the stable operationof the Internet canbe ensured.The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability.This paper proposes an industrial control device identification method based on PCA-Adaboost,which integrates rule matching and machine learning.We first build a rule base from network data collection and then use single andmulti-protocol rule-matchingmethods to identify the type of industrial control devices.Finally,we utilize PCA-Adaboost to identify unlabeled data.The experimental results show that the recognition rate of this method is better than that of the traditional Nmap device recognitionmethod and the device recognition accuracy rate reaches 99%.The evaluation effect of the test data set is significantly enhanced.展开更多
Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographi...Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographically distributed control elements,and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions.In recent years,there has been a lot of focus on the security of industrial control systems.Due to the advancement in information technologies,the risk of cyberattacks on industrial control system has been drastically increased.Because they are so inextricably tied to human life,any damage to them might have devastating consequences.To provide an efficient solution to such problems,this paper proposes a new approach to intrusion detection.First,the important features in the dataset are determined by the difference between the distribution of unlabeled and positive data which is deployed for the learning process.Then,a prior estimation of the class is proposed based on a support vector machine.Simulation results show that the proposed approach has better anomaly detection performance than existing algorithms.展开更多
Recently,Industrial Control Systems(ICSs)have been changing from a closed environment to an open environment because of the expansion of digital transformation,smart factories,and Industrial Internet of Things(IIoT).S...Recently,Industrial Control Systems(ICSs)have been changing from a closed environment to an open environment because of the expansion of digital transformation,smart factories,and Industrial Internet of Things(IIoT).Since security accidents that occur in ICSs can cause national confusion and human casualties,research on detecting abnormalities by using normal operation data learning is being actively conducted.The single technique proposed by existing studies does not detect abnormalities well or provide satisfactory results.In this paper,we propose a GRU-based Buzzer Ensemble for AbnormalDetection(GBE-AD)model for detecting anomalies in industrial control systems to ensure rapid response and process availability.The newly proposed ensemble model of the buzzer method resolves False Negatives(FNs)by complementing the limited range that can be detected in a single model because of the internal models composing GBE-AD.Because the internal models remain suppressed for False Positives(FPs),GBE-AD provides better generalization.In addition,we generated mean prediction error data in GBE-AD and inferred abnormal processes using soft and hard clustering.We confirmed that the detection model’s Time-series Aware Precision(TaP)suppressed FPs at 97.67%.The final performance was 94.04%in an experiment using anHIL-basedAugmented ICS(HAI)Security Dataset(ver.21.03)among public datasets.展开更多
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform...Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.展开更多
Effects of process parameters on microstructure and mechanical properties of the AM50A magnesium alloy components formed by double control forming (DCF) were investigated via a four-factor and four-level orthogonal ...Effects of process parameters on microstructure and mechanical properties of the AM50A magnesium alloy components formed by double control forming (DCF) were investigated via a four-factor and four-level orthogonal experiment. The variable curves of DCF showed that the forging procedure was started in the following 35 ms after the injection procedure was completed. It was confirmed that the high-speed filling and high-pressure densifying were combined together in the DCF process. Better surface quality and higher mechanical properties were achieved in the components formed by DCF as compared to die casting (DC) due to the refined and uniform microstructure with a few defects or without defects. Injection speed affected more effectively the yield strength (YS), ultimate tensile strength (UTS) and elongation as compared to pouring temperature, die temperature and forging force. But the pouring temperature had a more significant effect on hardness as compared to injection speed, die temperature and forging force. Pouring temperature of 675 °C, injection speed of 2.7 m/s and forging force of 4000 kN except for die temperature were the optimal parameters for obtaining the highest YS, UTS, elongation and Vickers hardness. Die temperatures of 205, 195, 195 and 225 °C were involved in achieving the highest YS, UTS, elongation and Vickers hardness, respectively. Obvious microporosity and microcracks were found on the fracture surface of the components formed by DC, deteriorating the mechanical properties. However, the tensile fracture morphology of the components formed by DCF was characterized by ductile fracture due to a large number of dimples and no defects, which was beneficial for improving the mechanical properties.展开更多
With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests...With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue.展开更多
A new type of brushless DC motor has been developed by using a square wave rare earth permanent magnet synchronous motor with its double loop control circuit. The double loop control scheme of the drive system yie...A new type of brushless DC motor has been developed by using a square wave rare earth permanent magnet synchronous motor with its double loop control circuit. The double loop control scheme of the drive system yields a combination of desired characteristics including simplified control structure, small ripple torque, high speed accuracy, wide operating speed range, and fast dynamic response. Experimental results confirm excellent characteristics of the motor.展开更多
[Objective] This study aimed to explore the effects of continuous application of controlled release nitrogen fertilizer under double rice cropping system. [Method] By modeling three types of paddy soils in Dong-Ting L...[Objective] This study aimed to explore the effects of continuous application of controlled release nitrogen fertilizer under double rice cropping system. [Method] By modeling three types of paddy soils in Dong-Ting Lake area, four treatments as no fertilizer (CK), urea, controlled release nitrogen fertilizer (CRNF) and 70% controlled release nitrogen fertilizer (70% CRNF) were designed in the micro-plot trials from 2005 to 2008. [Result] The rice yield in treatment CRNF at N 150 kg/hm2 was increased by 10.3%, 8.0% and 2.4% compared with treatment of urea, in alluvial sandy loamy paddy soil (ALS), purple calcareous clayey paddy soil (PCS), and reddish yellow loamy paddy soil (RYS), respectively; and the yield in treatment of 70% CRNF was increased by 6.1%, 2.6% and -0.8%, respectively. The ranking order of nitrogen uptake amount by plant in early rice and late rice was CRNF 70% CRNF urea CK in all three types of soil. Nitrogen utilization efficiency of CRNF in above three types of soil was 60.7%, 59.6% and 56.3%, increased by 23.8%, 19.4% and 16.3% compared with that in treatment of urea, respectively. Nitrogen utilization efficiency of CRNF in early rice was increased year by year, and was higher than that of 70% CRNF during the whole experiment stage, while that in late rice was increased first and then decreased from the 3rd year. [Conclusion] Continuous application CRNF could alleviate the decreasing of soil nitrogen fertility and organic carbon especially in ALS, increase rice yield and nitrogen utilization efficiency in double-rice cropping system.展开更多
Motivated by recent advances made in the study of dividend control and risk management problems involving the U.S.bankruptcy code,in this paper we follow[44]to revisit the De Finetti dividend control problem under the...Motivated by recent advances made in the study of dividend control and risk management problems involving the U.S.bankruptcy code,in this paper we follow[44]to revisit the De Finetti dividend control problem under the reorganization process and the regulator's intervention documented in U.S.Chapter 11 bankruptcy.We do this by further accommodating the fixed transaction costs on dividends to imitate the real-world procedure of dividend payments.Incorporating the fixed transaction costs transforms the targeting optimal dividend problem into an impulse control problem rather than a singular control problem,and hence computations and proofs that are distinct from[44]are needed.To account for the financial stress that is due to the more subtle concept of Chapter 11 bankruptcy,the surplus process after dividends is driven by a piece-wise spectrally negative Lévy process with endogenous regime switching.Some explicit expressions of the expected net present values under a double barrier dividend strategy,new to the literature,are established in terms of scale functions.With the help of these expressions,we are able to characterize the optimal strategy among the set of admissible double barrier dividend strategies.When the tail of the Lévy measure is log-convex,this optimal double barrier dividend strategy is then verified as the optimal dividend strategy,solving our optimal impulse control problem.展开更多
Aiming at the problems of large load of rotation drive system,low efficiency of torque transmission and high cost for operation and maintenance of liner steering drilling system for the horizontal well,a new method of...Aiming at the problems of large load of rotation drive system,low efficiency of torque transmission and high cost for operation and maintenance of liner steering drilling system for the horizontal well,a new method of liner differential rotary drilling with double tubular strings in the horizontal well is proposed.The technical principle of this method is revealed,supporting tools such as the differential rotation transducer,composite rotary steering system and the hanger are designed,and technological process is optimized.A tool face control technique of steering drilling assembly is proposed and the calculation model of extension limit of liner differential rotary drilling with double tubular strings in horizontal well is established.These results show that the liner differential rotary drilling with double tubular strings is equipped with measurement while drilling(MWD)and positive displacement motor(PDM),and directional drilling of horizontal well is realized by adjusting rotary speed of drill pipe to control the tool face of PDM.Based on the engineering case of deep coalbed methane horizontal well in the eastern margin of Ordos Basin,the extension limit of horizontal drilling with double tubular strings is calculated.Compared with the conventional liner drilling method,the liner differential rotary drilling with double tubular strings increases the extension limit value of horizontal well significantly.The research findings provide useful reference for the integrated design and control of liner completion and drilling of horizontal wells.展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
The genomes of eukaryotic cells are under continuous assault by environmental agents and endogenous metabolic byproducts. Damage induced in DNA usually leads to a cascade of cellular events, the DNA damage response. F...The genomes of eukaryotic cells are under continuous assault by environmental agents and endogenous metabolic byproducts. Damage induced in DNA usually leads to a cascade of cellular events, the DNA damage response. Failure of the DNA damage response can lead to development of malignancy by reducing the efficiency and fidelity of DNA repair. The NBS1 protein is a component of the MRE11/RAD50/NBS 1 complex (MRN) that plays a critical role in the cellular response to DNA damage and the maintenance of chromosomal integrity. Mutations in the NBS1 gene are responsible for Nijmegen breakage syndrome (NBS), a hereditary disorder that imparts an increased predisposition to development of malignancy. The phenotypic characteristics of cells isolated from NBS patients point to a deficiency in the repair of DNA double strand breaks. Here, we review the current knowledge of the role of NBS1 in the DNA damage response. Emphasis is placed on the role of NBS1 in the DNA double strand repair, modulation of the DNA damage sensing and signaling, cell cycle checkpoint control and maintenance oftelomere stability.展开更多
On the basis of the gain-scheduled H∞ design strategy, a novel active fault-tolerant control scheme is proposed. Under the assumption that the effects of faults on the state-space matrices of systems can be of affine...On the basis of the gain-scheduled H∞ design strategy, a novel active fault-tolerant control scheme is proposed. Under the assumption that the effects of faults on the state-space matrices of systems can be of affine parameter dependence, a reconfigurable robust H∞ linear parameter varying controller is developed. The designed controller is a function of the fault effect factors that can be derived online by using a well-trained neural network. To demonstrate the effectiveness of the proposed method, a double inverted pendulum system, with a fault in the motor tachometer loop, is considered.展开更多
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金supported by the National Science and Technology Council under grants NSTC 112-2221-E-320-002the Buddhist Tzu Chi Medical Foundation in Taiwan under Grant TCMMP 112-02-02.
文摘In many Eastern and Western countries,falling birth rates have led to the gradual aging of society.Older adults are often left alone at home or live in a long-term care center,which results in them being susceptible to unsafe events(such as falls)that can have disastrous consequences.However,automatically detecting falls fromvideo data is challenging,and automatic fall detection methods usually require large volumes of training data,which can be difficult to acquire.To address this problem,video kinematic data can be used as training data,thereby avoiding the requirement of creating a large fall data set.This study integrated an improved particle swarm optimization method into a double interactively recurrent fuzzy cerebellar model articulation controller model to develop a costeffective and accurate fall detection system.First,it obtained an optical flow(OF)trajectory diagram from image sequences by using the OF method,and it solved problems related to focal length and object offset by employing the discrete Fourier transform(DFT)algorithm.Second,this study developed the D-IRFCMAC model,which combines spatial and temporal(recurrent)information.Third,it designed an IPSO(Improved Particle Swarm Optimization)algorithm that effectively strengthens the exploratory capabilities of the proposed D-IRFCMAC(Double-Interactively Recurrent Fuzzy Cerebellar Model Articulation Controller)model in the global search space.The proposed approach outperforms existing state-of-the-art methods in terms of action recognition accuracy on the UR-Fall,UP-Fall,and PRECIS HAR data sets.The UCF11 dataset had an average accuracy of 93.13%,whereas the UCF101 dataset had an average accuracy of 92.19%.The UR-Fall dataset had an accuracy of 100%,the UP-Fall dataset had an accuracy of 99.25%,and the PRECIS HAR dataset had an accuracy of 99.07%.
基金Our work is supported by the National Key R&D Program of China(2021YFB2012400).
文摘With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.
基金supported in part by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under Grant 21KJA470007。
文摘The complex working conditions and nonlinear characteristics of the motor drive control system of industrial robots make it difficult to detect faults.In this paper,a deep learning-based observer,which combines the convolutional neural network(CNN)and the long short-term memory network(LSTM),is employed to approximate the nonlinear driving control system.CNN layers are introduced to extract dynamic features of the data,whereas LSTM layers perform time-sequential prediction of the target system.In terms of application,normal samples are fed into the observer to build an offline prediction model for the target system.The trained CNN-LSTM-based observer is then deployed along with the target system to estimate the system outputs.Online fault detection can be realized by analyzing the residuals.Finally,an application of the proposed fault detection method to a brushless DC motor drive system is given to verify the effectiveness of the proposed scheme.Simulation results indicate the impressive fault detection capability of the presented method for driving control systems of industrial robots.
基金the financial support from National Natural Science Foundation of China (21878011)。
文摘The mass and thermal coupling makes the control of the reactive double dividing-wall distillation column(R-DDWDC) an especially challenging issue with a highly interactive nature. With reference to the separation of an ideal endothermic quaternary reversible reaction with the most unfavorable ranking of relative volatilities(A + B ■ C + D with α_(A)>α_(C)>α_(D)>α_(B)), the operation rationality of the R-DDWDC is studied in this contribution. The four-point single temperature control system leads to great steady-state discrepancies in the compositions of products C and D and the reason stems essentially from the failure in keeping strictly the stoichiometric ratio between reactants A and B. A temperature plus temperature cascade control scheme is then employed to reinforce the stoichiometric ratio control and helps to secure a substantial abatement in the steady-state discrepancies. A temperature difference plus temperature cascade control scheme is finally synthesized and leads even to better performance than the most effective double temperature difference control scheme. These outcomes reveal not only the operation feasibility of the R-DDWDC but also the general significance of the proposed temperature difference plus temperature cascade control scheme to the inferential control of any other complicated distillation columns.
基金supported by the Korea WESTERN POWER(KOWEPO)(2022-Commissioned Research-11,Development of Cyberattack Detection Technology for New and Renewable Energy Control System Using AI(Artificial Intelligence),50%)the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-01806,Development of Security by Design and Security Management Technology in Smart Factory,40%)the Gachon University Research Fund of 2023(GCU-202110280001,10%).
文摘Cyberattacks targeting industrial control systems(ICS)are becoming more sophisticated and advanced than in the past.A programmable logic controller(PLC),a core component of ICS,controls and monitors sensors and actuators in the field.However,PLC has memory attack threats such as program injection and manipulation,which has long been a major target for attackers,and it is important to detect these attacks for ICS security.To detect PLC memory attacks,a security system is required to acquire and monitor PLC memory directly.In addition,the performance impact of the security system on the PLC makes it difficult to apply to the ICS.To address these challenges,this paper proposes a system to detect PLC memory attacks by continuously acquiring and monitoring PLC memory.The proposed system detects PLC memory attacks by acquiring the program blocks and block information directly from the same layer as the PLC and then comparing them in bytes with previous data.Experiments with Siemens S7-300 and S7-400 PLC were conducted to evaluate the PLC memory detection performance and performance impact on PLC.The experimental results demonstrate that the proposed system detects all malicious organization block(OB)injection and data block(DB)manipulation,and the increment of PLC cycle time,the impact on PLC performance,was less than 1 ms.The proposed system detects PLC memory attacks with a simpler detection method than earlier studies.Furthermore,the proposed system can be applied to ICS with a small performance impact on PLC.
基金funded in part by the National Key R&D Program of China(Grant No.2022YFB3102901)the National Natural Science Foundation of China(Grant Nos.61976064,61871140,62272119,62072130)the Guangdong Province Key Research and Development Plan(Grant No.2019B010137004).
文摘To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack defense.For example,if vulnerable equipment or devices can be discovered in advance and the attack path canbe cut off,security threats canbe effectively avoided and the stable operationof the Internet canbe ensured.The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability.This paper proposes an industrial control device identification method based on PCA-Adaboost,which integrates rule matching and machine learning.We first build a rule base from network data collection and then use single andmulti-protocol rule-matchingmethods to identify the type of industrial control devices.Finally,we utilize PCA-Adaboost to identify unlabeled data.The experimental results show that the recognition rate of this method is better than that of the traditional Nmap device recognitionmethod and the device recognition accuracy rate reaches 99%.The evaluation effect of the test data set is significantly enhanced.
基金funded by the Research Deanship at the University of Ha’il-Saudi Arabia through Project Number RG-20146。
文摘Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographically distributed control elements,and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions.In recent years,there has been a lot of focus on the security of industrial control systems.Due to the advancement in information technologies,the risk of cyberattacks on industrial control system has been drastically increased.Because they are so inextricably tied to human life,any damage to them might have devastating consequences.To provide an efficient solution to such problems,this paper proposes a new approach to intrusion detection.First,the important features in the dataset are determined by the difference between the distribution of unlabeled and positive data which is deployed for the learning process.Then,a prior estimation of the class is proposed based on a support vector machine.Simulation results show that the proposed approach has better anomaly detection performance than existing algorithms.
基金supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by Korea government Ministry of Science,ICT(MSIT)(No.2019-0-01343,convergence security core talent training business).
文摘Recently,Industrial Control Systems(ICSs)have been changing from a closed environment to an open environment because of the expansion of digital transformation,smart factories,and Industrial Internet of Things(IIoT).Since security accidents that occur in ICSs can cause national confusion and human casualties,research on detecting abnormalities by using normal operation data learning is being actively conducted.The single technique proposed by existing studies does not detect abnormalities well or provide satisfactory results.In this paper,we propose a GRU-based Buzzer Ensemble for AbnormalDetection(GBE-AD)model for detecting anomalies in industrial control systems to ensure rapid response and process availability.The newly proposed ensemble model of the buzzer method resolves False Negatives(FNs)by complementing the limited range that can be detected in a single model because of the internal models composing GBE-AD.Because the internal models remain suppressed for False Positives(FPs),GBE-AD provides better generalization.In addition,we generated mean prediction error data in GBE-AD and inferred abnormal processes using soft and hard clustering.We confirmed that the detection model’s Time-series Aware Precision(TaP)suppressed FPs at 97.67%.The final performance was 94.04%in an experiment using anHIL-basedAugmented ICS(HAI)Security Dataset(ver.21.03)among public datasets.
文摘Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.
基金Project(51075099)supported by the National Natural Science Foundation of ChinaProject(E201038)supported by the Natural Science Foundation of Heilongjiang Province,China+2 种基金Project(HIT.NSRIF.2013007)supported by the Fundamental Research Funds for the Central Universities,ChinaProject(2011RFQXG010)supported by the Harbin City Young Scientists Foundation,ChinaProject(LBH-T1102)supported by Specially Postdoctoral Science Foundation of Heilongjiang Province,China
文摘Effects of process parameters on microstructure and mechanical properties of the AM50A magnesium alloy components formed by double control forming (DCF) were investigated via a four-factor and four-level orthogonal experiment. The variable curves of DCF showed that the forging procedure was started in the following 35 ms after the injection procedure was completed. It was confirmed that the high-speed filling and high-pressure densifying were combined together in the DCF process. Better surface quality and higher mechanical properties were achieved in the components formed by DCF as compared to die casting (DC) due to the refined and uniform microstructure with a few defects or without defects. Injection speed affected more effectively the yield strength (YS), ultimate tensile strength (UTS) and elongation as compared to pouring temperature, die temperature and forging force. But the pouring temperature had a more significant effect on hardness as compared to injection speed, die temperature and forging force. Pouring temperature of 675 °C, injection speed of 2.7 m/s and forging force of 4000 kN except for die temperature were the optimal parameters for obtaining the highest YS, UTS, elongation and Vickers hardness. Die temperatures of 205, 195, 195 and 225 °C were involved in achieving the highest YS, UTS, elongation and Vickers hardness, respectively. Obvious microporosity and microcracks were found on the fracture surface of the components formed by DC, deteriorating the mechanical properties. However, the tensile fracture morphology of the components formed by DCF was characterized by ductile fracture due to a large number of dimples and no defects, which was beneficial for improving the mechanical properties.
基金supported by the National Natural Science Foundation of China (62272078)。
文摘With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue.
文摘A new type of brushless DC motor has been developed by using a square wave rare earth permanent magnet synchronous motor with its double loop control circuit. The double loop control scheme of the drive system yields a combination of desired characteristics including simplified control structure, small ripple torque, high speed accuracy, wide operating speed range, and fast dynamic response. Experimental results confirm excellent characteristics of the motor.
基金Supported by the National Key Technology Research and Development Program of China during the11th Five-Year Plan Period(2008BADA4B08)Science and Technology Innovation Project of Hunan Academy of Agricultural Sciences(2010hnnkycx56)~~
文摘[Objective] This study aimed to explore the effects of continuous application of controlled release nitrogen fertilizer under double rice cropping system. [Method] By modeling three types of paddy soils in Dong-Ting Lake area, four treatments as no fertilizer (CK), urea, controlled release nitrogen fertilizer (CRNF) and 70% controlled release nitrogen fertilizer (70% CRNF) were designed in the micro-plot trials from 2005 to 2008. [Result] The rice yield in treatment CRNF at N 150 kg/hm2 was increased by 10.3%, 8.0% and 2.4% compared with treatment of urea, in alluvial sandy loamy paddy soil (ALS), purple calcareous clayey paddy soil (PCS), and reddish yellow loamy paddy soil (RYS), respectively; and the yield in treatment of 70% CRNF was increased by 6.1%, 2.6% and -0.8%, respectively. The ranking order of nitrogen uptake amount by plant in early rice and late rice was CRNF 70% CRNF urea CK in all three types of soil. Nitrogen utilization efficiency of CRNF in above three types of soil was 60.7%, 59.6% and 56.3%, increased by 23.8%, 19.4% and 16.3% compared with that in treatment of urea, respectively. Nitrogen utilization efficiency of CRNF in early rice was increased year by year, and was higher than that of 70% CRNF during the whole experiment stage, while that in late rice was increased first and then decreased from the 3rd year. [Conclusion] Continuous application CRNF could alleviate the decreasing of soil nitrogen fertility and organic carbon especially in ALS, increase rice yield and nitrogen utilization efficiency in double-rice cropping system.
基金the financial support from the National Natural Science Foundation of China(12171405 and 11661074)the Program for New Century Excellent Talents in Fujian Province University+2 种基金the financial support from the Characteristic&Preponderant Discipline of Key Construction Universities in Zhejiang Province(Zhejiang Gongshang University-Statistics)Collaborative Innovation Center of Statistical Data Engineering Technology&ApplicationDigital+Discipline Construction Project(SZJ2022B004)。
文摘Motivated by recent advances made in the study of dividend control and risk management problems involving the U.S.bankruptcy code,in this paper we follow[44]to revisit the De Finetti dividend control problem under the reorganization process and the regulator's intervention documented in U.S.Chapter 11 bankruptcy.We do this by further accommodating the fixed transaction costs on dividends to imitate the real-world procedure of dividend payments.Incorporating the fixed transaction costs transforms the targeting optimal dividend problem into an impulse control problem rather than a singular control problem,and hence computations and proofs that are distinct from[44]are needed.To account for the financial stress that is due to the more subtle concept of Chapter 11 bankruptcy,the surplus process after dividends is driven by a piece-wise spectrally negative Lévy process with endogenous regime switching.Some explicit expressions of the expected net present values under a double barrier dividend strategy,new to the literature,are established in terms of scale functions.With the help of these expressions,we are able to characterize the optimal strategy among the set of admissible double barrier dividend strategies.When the tail of the Lévy measure is log-convex,this optimal double barrier dividend strategy is then verified as the optimal dividend strategy,solving our optimal impulse control problem.
基金Supported by the Project of National Natural Science Foundation of China(52234002,42230814)。
文摘Aiming at the problems of large load of rotation drive system,low efficiency of torque transmission and high cost for operation and maintenance of liner steering drilling system for the horizontal well,a new method of liner differential rotary drilling with double tubular strings in the horizontal well is proposed.The technical principle of this method is revealed,supporting tools such as the differential rotation transducer,composite rotary steering system and the hanger are designed,and technological process is optimized.A tool face control technique of steering drilling assembly is proposed and the calculation model of extension limit of liner differential rotary drilling with double tubular strings in horizontal well is established.These results show that the liner differential rotary drilling with double tubular strings is equipped with measurement while drilling(MWD)and positive displacement motor(PDM),and directional drilling of horizontal well is realized by adjusting rotary speed of drill pipe to control the tool face of PDM.Based on the engineering case of deep coalbed methane horizontal well in the eastern margin of Ordos Basin,the extension limit of horizontal drilling with double tubular strings is calculated.Compared with the conventional liner drilling method,the liner differential rotary drilling with double tubular strings increases the extension limit value of horizontal well significantly.The research findings provide useful reference for the integrated design and control of liner completion and drilling of horizontal wells.
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
文摘The genomes of eukaryotic cells are under continuous assault by environmental agents and endogenous metabolic byproducts. Damage induced in DNA usually leads to a cascade of cellular events, the DNA damage response. Failure of the DNA damage response can lead to development of malignancy by reducing the efficiency and fidelity of DNA repair. The NBS1 protein is a component of the MRE11/RAD50/NBS 1 complex (MRN) that plays a critical role in the cellular response to DNA damage and the maintenance of chromosomal integrity. Mutations in the NBS1 gene are responsible for Nijmegen breakage syndrome (NBS), a hereditary disorder that imparts an increased predisposition to development of malignancy. The phenotypic characteristics of cells isolated from NBS patients point to a deficiency in the repair of DNA double strand breaks. Here, we review the current knowledge of the role of NBS1 in the DNA damage response. Emphasis is placed on the role of NBS1 in the DNA double strand repair, modulation of the DNA damage sensing and signaling, cell cycle checkpoint control and maintenance oftelomere stability.
文摘On the basis of the gain-scheduled H∞ design strategy, a novel active fault-tolerant control scheme is proposed. Under the assumption that the effects of faults on the state-space matrices of systems can be of affine parameter dependence, a reconfigurable robust H∞ linear parameter varying controller is developed. The designed controller is a function of the fault effect factors that can be derived online by using a well-trained neural network. To demonstrate the effectiveness of the proposed method, a double inverted pendulum system, with a fault in the motor tachometer loop, is considered.