Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufactur...Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufac^ring center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.展开更多
Cyber-physical systems (CPS) are complex distributed heterogeneous systems which integrating cyber and physical processes by computation, communication and control. During interaction between cyber and physical worl...Cyber-physical systems (CPS) are complex distributed heterogeneous systems which integrating cyber and physical processes by computation, communication and control. During interaction between cyber and physical world, the traditional theories and applications has been difficult to satisfy real-time performance and efficient. Cyber-physical systems clearly have a role to play in developing a new theory of computer-mediated physical systems. The aim of this work is to analysis the features and relation technology of CPS that get better understanding for this new field. We summarized the research progresses from different perspectives such as modeling, classical tools and applications. Finally, the research challenges for CPS are in brief outlined.展开更多
This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,t...This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,the output and state information of CPSs is unavailable for the feedback design,and the classical coordinate conversion of the iterative process is incompetent in relation to the tracking task.To solve this,a new coordinate conversion is proposed by considering the attack gains and the reference signal simultaneously.By employing the transformed variables,a modified fractional-order command-filtered signal is incorporated to overcome the complexity explosion issue,and the Nussbaum function is used to tackle the varying attack gains.By systematically constructing the Lyapunov-Krasovskii functional,an adaptive event-triggered mechanism is presented in detail,with which the communication resources are greatly saved,and the finite-time tracking of CPSs under cyber attacks is guaranteed.Finally,an example demonstrates the effectiveness.展开更多
Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CP...Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CPS offers huge processing and storage resources for CPS thatfinds helpful for a range of application areas.At the same time,with the massive development of applica-tions that exist in the CPS environment,the energy utilization of the cloud enabled CPS has gained significant interest.For improving the energy effective-ness of the CC platform,virtualization technologies have been employed for resource management and the applications are executed via virtual machines(VMs).Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS,this paper focuses on the design of chaotic sandpi-per optimization based VM scheduling(CSPO-VMS)technique for energy effi-cient CPS.The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy.The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory,which substitutes the main parameter and combines it with the chaos.In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm,the chaotic concept is included in the SPO algorithm.The CSPO-VMS technique also derives afitness function to choose optimal scheduling strategy in the CPS environment.In order to demonstrate the enhanced performance of the CSPO-VMS technique,a wide range of simulations were carried out and the results are examined under varying aspects.The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures.展开更多
A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physic...A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.展开更多
Without the known state equation, a new state estimation strategy is designed to be against malicious attacks for cyber physical systems. Inspired by the idea of data reconstruction, the compressive sensing (CS) is ...Without the known state equation, a new state estimation strategy is designed to be against malicious attacks for cyber physical systems. Inspired by the idea of data reconstruction, the compressive sensing (CS) is applied to reconstruction of residual measurements after the detection and identification scheme based on the Markov graph of the system state, which increases the resilience of state estimation strategy against deception attacks. First, the observability analysis is introduced to decide the triggering time of the measurement reconstruction and the damage level from attacks. In particular, the dictionary learning is proposed to form the over-completed dictionary by K-singular value decomposition (K-SVD), which is produced adaptively according to the characteristics of the measurement data. In addition, due to the irregularity of residual measurements, a sampling matrix is designed as the measurement matrix. Finally, the simulation experiments are performed on 6-bus power system. Results show that the reconstruction of measurements is completed well by the proposed reconstruction method, and the corresponding effects are better than reconstruction scheme based on the joint dictionary and the traditional Gauss or Bernoulli random matrix respectively. Especially, when only 29% available clean measurements are left, performance of the proposed strategy is still extraordinary, which reflects generality for five kinds of recovery algorithms.展开更多
Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidan...Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.展开更多
Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of ...Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems(CPES).At the same time,the rising ubiquity of wireless sensor networks(WSN)in several application areas makes it a vital part of the design of CPES.Since security and energy efficiency are the major challenging issues in CPES,this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms(EASCPSMA).The presented EASCPS-MA technique intends to attain lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm(IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation(RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.展开更多
To cope with the task scheduling problem under multi-task and transportation consideration in large-scale service oriented manufacturing systems(SOMS), a service allocation optimization mathematical model was establis...To cope with the task scheduling problem under multi-task and transportation consideration in large-scale service oriented manufacturing systems(SOMS), a service allocation optimization mathematical model was established, and then a hybrid discrete particle swarm optimization-genetic algorithm(HDPSOGA) was proposed. In SOMS, each resource involved in the whole life cycle of a product, whether it is provided by a piece of software or a hardware device, is encapsulated into a service. So, the transportation during production of a task should be taken into account because the hard-services selected are possibly provided by various providers in different areas. In the service allocation optimization mathematical model, multi-task and transportation were considered simultaneously. In the proposed HDPSOGA algorithm, integer coding method was applied to establish the mapping between the particle location matrix and the service allocation scheme. The position updating process was performed according to the cognition part, the social part, and the previous velocity and position while introducing the crossover and mutation idea of genetic algorithm to fit the discrete space. Finally, related simulation experiments were carried out to compare with other two previous algorithms. The results indicate the effectiveness and efficiency of the proposed hybrid algorithm.展开更多
with the development of science and technology, smart home systems require better, faster to meet the needs of human. In order to achieve this goal, the human-machine-items all need to interact each other with underst...with the development of science and technology, smart home systems require better, faster to meet the needs of human. In order to achieve this goal, the human-machine-items all need to interact each other with understand, efficient and speedy. Cps could unify combination with the human-machine-items; realize the interaction between the physical nformation and the cyber world. However, information interaction and the control task needs to be completed in a valid time. Therefore, the transform delay control strategy becomes more and more important. This paper analysis Markov delay control strategy for smart home systems, which might help the system decrease the transmission delay.展开更多
Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(I...Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(IIOT) sensors in manufacturing processes, there is a progressive need for optimal and effective approaches to data management.Embracing machine learning and artificial intelligence to take advantage of manufacturing data can lead to efficient and intelligent automation. In this paper, we conduct a comprehensive analysis based on evolutionary computing and neural network algorithms toward making semiconductor manufacturing smart.We propose a dynamic algorithm for gaining useful insights about semiconductor manufacturing processes and to address various challenges. We elaborate on the utilization of a genetic algorithm and neural network to propose an intelligent feature selection algorithm. Our objective is to provide an advanced solution for controlling manufacturing processes and to gain perspective on various dimensions that enable manufacturers to access effective predictive technologies.展开更多
The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant p...The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions.展开更多
Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical...Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical systems’(CPS)efficient end-to-end workflows.In order to provide accurate snow detection results for the CPS’s terminal,this paper proposed a snow cover detection algorithm based on the unsupervised Gaussian mixture model(GMM)for the FY-4A satellite data.At present,most snow cover detection algorithms mainly utilize the characteristics of the optical spectrum,which is based on the normalized difference snow index(NDSI)with thresholds in different wavebands.These algorithms require a large amount of manually labeled data for statistical analysis to obtain the appropriate thresholds for the study area.Consideration must be given to both the high and low elevations in the study area.It is difficult to extract all snow by a fixed threshold in mountainous and rugged terrains.In this research,we avoid relying on a manual analysis for different elevations.Therefore,an algorithm based on the GMM is proposed,integrating the threshold-based algorithm and the GMM.First,the threshold-based algorithm with transferred thresholds from other satellites’analysis results are used to coarsely classify the surface objects.These results are then used to initialize the parameters of the GMM.Finally,the parameters of that model are updated by an expectation-maximum(EM)iteration algorithm,and the final results are outputted when the iterative conditions end.The results show that this algorithm can adjust itself to mountainous terrain with different elevations,and exhibits a better performance than the threshold-based algorithm.Compared with orbit satellites’snow products,the accuracy of the algorithm used for FY-4A is improved by nearly 2%,and the snow detection rate is increased by nearly 6%.Moreover,compared with microwave sensors’snow products,the accuracy is increased by nearly 3%.The validation results show that the proposed algorithm can be adapted to a complex terrain environment in mountainous areas and exhibits good performance under a transferred threshold without manually assigned labels.展开更多
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention...This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.展开更多
Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.te...Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.tend to develop CPS as a proficient model for healthcare applications especially,home patient care.Though several techniques have been proposed earlier related to CPS structures,only a handful of studies has focused on the design of CPS models for health care sector.So,the proposal for a dedicated CPS model for healthcare sector necessitates a significant interest to ensure data privacy.To overcome the challenges,the current research paper designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS(DLIDIC-SCPS)model for healthcare sector.The aim of the proposed DLIDIC-SCPS model is to achieve secure image transmission and image classification process for CPS in healthcare sector.Primarily,data acquisition takes place with the help of sensors and detection of intrusions is performed using Fuzzy Deep Neural Network(FDNN)technique.Besides,Multiple Share Creation(MSC)approach is used to create several shares of medical image so as to accomplish security.Also,blockchain is employed as a distributed data storage entity to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network(FWNN)is utilized that diagnose the disease from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is utilized to fine tune the parameters involved in WNN model,thereby boosting its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS technique.The simulation outcomes confirm that DLIDIC-SCPS approach demonstrates promising results in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.展开更多
In order to improve the slurry pH control accuracy of the absorption tower in the wet flue gas desulfurization process,a model free adaptive predictive control algorithm for the desulfurization slurry pH which is base...In order to improve the slurry pH control accuracy of the absorption tower in the wet flue gas desulfurization process,a model free adaptive predictive control algorithm for the desulfurization slurry pH which is based on a cyber physical systems framework is proposed.First,aiming to address system characteristics of non-linearity and pure hysteresis in slurry pH change process,a model free adaptive predictive control algorithm based on compact form dynamic linearization is proposed by combining model free adaptive control algorithm with model predictive control algorithm.Then,by integrating information resources with the physical resources in the absorption tower slurry pH control process,an absorption tower slurry pH optimization control system based on cyber physical systems is constructed.It is turned out that the model free adaptive predictive control algorithm under the framework of the cyber physical systems can effectively realize the high-precision tracking control of the slurry pH of the absorption tower,and it has strong robustness.展开更多
The advanced and personalised experience that modern cars offer makes them more and more data-hungry.For example,the cabin preferences of the possible drivers must be recorded and associated to some identity,while suc...The advanced and personalised experience that modern cars offer makes them more and more data-hungry.For example,the cabin preferences of the possible drivers must be recorded and associated to some identity,while such data could be exploited to deduce sensitive information about the driver’s health.Therefore,drivers’privacy must be taken seriously,requiring a dedicated risk assessment framework,as presented in this paper through a double assessment combining the asset-oriented ISO approach with the threat-oriented STRIDE approach.The framework is tailored to the level of specific car brand and demonstrated on the ten top-selling brands as well as,due to its innovative character,Tesla.The two approaches yield different,but complementary findings,demonstrating the additional insights gained through their parallel adoption.展开更多
Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal...Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal manufacturing environments,which poses great challenges to manufacturing enterprises.Fortunately,recent advances in the Industrial Internet of Things(IIoT)and the widespread use of embedded processors and sensors in factories enable collecting real-time manufacturing status data and building cyber–physical systems for smart,flexible,and resilient manufacturing systems.In this context,this paper investigates the mechanisms and methodology of self-organization and self-adaption to tackle exceptions and disturbances in discrete manufacturing processes.Specifically,a general model of smart manufacturing complex networks is constructed using scale-free networks to interconnect heterogeneous manufacturing resources represented by network vertices at multiple levels.Moreover,the capabilities of physical manufacturing resources are encapsulated into virtual manufacturing services using cloud technology,which can be added to or removed from the networks in a plug-and-play manner.Materials,information,and financial assets are passed through interactive links across the networks.Subsequently,analytical target cascading is used to formulate the processes of self-organizing optimal configuration and self-adaptive collaborative control for multilevel key manufacturing resources while particle swarm optimization is used to solve local problems on network vertices.Consequently,an industrial case based on a Chinese engine factory demonstrates the feasibility and efficiency of the proposed model and method in handling typical exceptions.The simulation results show that the proposed mechanism and method outperform the event-triggered rescheduling method,reducing manufacturing cost,manufacturing time,waiting time,and energy consumption,with reasonable computational time.This work potentially enables managers and practitioners to implement active perception,active response,self-organization,and self-adaption solutions in discrete manufacturing enterprises.展开更多
With the rapid development of human society, the urbanization of the world’s population is also progressing rapidly. Urbanization has brought many challenges and problems to the development of cities. For example, th...With the rapid development of human society, the urbanization of the world’s population is also progressing rapidly. Urbanization has brought many challenges and problems to the development of cities. For example, the urban population is under excessive pressure, various natural resources and energy are increasingly scarce, and environmental pollution is increasing, etc. However, the original urban model has to be changed to enable people to live in greener and more sustainable cities, thus providing them with a more convenient and comfortable living environment. The new urban framework, the smart city, provides excellent opportunities to meet these challenges,while solving urban problems at the same time. At this stage, many countries are actively responding to calls for smart city development plans. This paper investigates the current stage of the smart city. First, it introduces the background of smart city development and gives a brief definition of the concept of the smart city. Second, it describes the framework of a smart city in accordance with the given definition. Finally, various intelligent algorithms to make cities smarter, along with specific examples, are discussed and analyzed.展开更多
Many competing approaches exist in evaluating sensor network solutions differing by levels of ease of use, cost, control, and realism. Existing work concentrates on simulating network protocols or emulating processing...Many competing approaches exist in evaluating sensor network solutions differing by levels of ease of use, cost, control, and realism. Existing work concentrates on simulating network protocols or emulating processing units at the machine cycle level. However, little has been done to emulate the sensors and the physical environments that they monitor. The main contribution of this work is the design of WiserEmulator, an emulation framework for structural health monitoring, which gracefully balances the trade-offs between realism, controllability, and cost. WiserEmulator consists of two main components -- a testbed of wireless sensor nodes and a software emulation environment. To emulate the excitation and response of piezo-electric transducers, as well as the wave propagation inside concrete structures, the COMSOL Multi-Physics software was utilized. Digitized sensing output from COMSOL was played back via a multi-channel Digital-to-Analog Converter (DAC) connected to the wireless sensor testbed. In addition to the emulation of concrete structures, WiSeREmulator also allows users to choose pre- stored data collected from field experiments and synthesized data. A user-friendly Graphical User Interface (GUI) was developed that facilitates intuitive configurations of experimental settings, control of the on-set and progression of the experiments, and real-time visualization of experimental results. We have implemented WiSeREmulator in MATLAB. This work advances the state of the art in providing low cost solutions to evaluating Cyber Physical Systems such as wireless structural health monitoring networks.展开更多
基金Supported by National Natural Science Foundation of China(Grant No.61272428)PhD Programs Foundation of Ministry of Education of China(Grant No.20120002110067)
文摘Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufac^ring center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.
文摘Cyber-physical systems (CPS) are complex distributed heterogeneous systems which integrating cyber and physical processes by computation, communication and control. During interaction between cyber and physical world, the traditional theories and applications has been difficult to satisfy real-time performance and efficient. Cyber-physical systems clearly have a role to play in developing a new theory of computer-mediated physical systems. The aim of this work is to analysis the features and relation technology of CPS that get better understanding for this new field. We summarized the research progresses from different perspectives such as modeling, classical tools and applications. Finally, the research challenges for CPS are in brief outlined.
基金Project supported by the National Natural Science Foundation of China(Nos.62103199 and 62103201)the Natural Science Foundation of Jiangsu Province,China(No.BK20210590)the China Postdoctoral Science Foundation(Nos.2022M711690 and 2023T160333)。
文摘This article addresses the secure finite-time tracking problem via event-triggered command-filtered control for nonlinear time-delay cyber physical systems(CPSs)subject to cyber attacks.Under the attack circumstance,the output and state information of CPSs is unavailable for the feedback design,and the classical coordinate conversion of the iterative process is incompetent in relation to the tracking task.To solve this,a new coordinate conversion is proposed by considering the attack gains and the reference signal simultaneously.By employing the transformed variables,a modified fractional-order command-filtered signal is incorporated to overcome the complexity explosion issue,and the Nussbaum function is used to tackle the varying attack gains.By systematically constructing the Lyapunov-Krasovskii functional,an adaptive event-triggered mechanism is presented in detail,with which the communication resources are greatly saved,and the finite-time tracking of CPSs under cyber attacks is guaranteed.Finally,an example demonstrates the effectiveness.
文摘Recently,with the growth of cyber physical systems(CPS),several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively.Besides,the cloud computing(CC)enabled CPS offers huge processing and storage resources for CPS thatfinds helpful for a range of application areas.At the same time,with the massive development of applica-tions that exist in the CPS environment,the energy utilization of the cloud enabled CPS has gained significant interest.For improving the energy effective-ness of the CC platform,virtualization technologies have been employed for resource management and the applications are executed via virtual machines(VMs).Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS,this paper focuses on the design of chaotic sandpi-per optimization based VM scheduling(CSPO-VMS)technique for energy effi-cient CPS.The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy.The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory,which substitutes the main parameter and combines it with the chaos.In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm,the chaotic concept is included in the SPO algorithm.The CSPO-VMS technique also derives afitness function to choose optimal scheduling strategy in the CPS environment.In order to demonstrate the enhanced performance of the CSPO-VMS technique,a wide range of simulations were carried out and the results are examined under varying aspects.The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures.
基金supported by the Researchers Supporting Program(TUMA-Project-2021-27)Almaarefa University,Riyadh,Saudi ArabiaTaif University Researchers Supporting Project number(TURSP-2020/161),Taif University,Taif,Saudi Arabia。
文摘A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.
基金This work was supported by the Natural Science Foundation of China (NSFC)-Guangdong Joint Foundation Key Project (No. U1401253), the NSFC (Nos. 61573153, 616721 74), the Foundation of Guangdong Provincial Science and Technology Projects (No. 2013B010401001 ), the Fundamental Research Funds for the Central Universities (No. 2015ZZ099), the Guangzhou Science and Technology Plan Project (No. 201510010132), the Maoming Science and Technology Plan Project (No. MM201 7000004), and the National Natural Science Foundation of Guangdong Province (No. 2016A030313510).
文摘Without the known state equation, a new state estimation strategy is designed to be against malicious attacks for cyber physical systems. Inspired by the idea of data reconstruction, the compressive sensing (CS) is applied to reconstruction of residual measurements after the detection and identification scheme based on the Markov graph of the system state, which increases the resilience of state estimation strategy against deception attacks. First, the observability analysis is introduced to decide the triggering time of the measurement reconstruction and the damage level from attacks. In particular, the dictionary learning is proposed to form the over-completed dictionary by K-singular value decomposition (K-SVD), which is produced adaptively according to the characteristics of the measurement data. In addition, due to the irregularity of residual measurements, a sampling matrix is designed as the measurement matrix. Finally, the simulation experiments are performed on 6-bus power system. Results show that the reconstruction of measurements is completed well by the proposed reconstruction method, and the corresponding effects are better than reconstruction scheme based on the joint dictionary and the traditional Gauss or Bernoulli random matrix respectively. Especially, when only 29% available clean measurements are left, performance of the proposed strategy is still extraordinary, which reflects generality for five kinds of recovery algorithms.
基金supported by the Shandong Provincial Key Research and Development Program of China(2018CXGC0701)the National Natural Science Foundation of China(NSFC)(Grant No.61972050)the foundation of State Key Laboratory of Network and Switching Technology,Beijing University of Posts and Telecommunications(SKLNST-2018-1-11)。
文摘Automotive cyber physical systems(CPSs)are ever more utilizing wireless technology for V2X communication as a potential way out for challenges regarding collision detection,wire strap up troubles and collision avoidance.However,security is constrained as a result of the energy and performance limitations of modem wireless systems.Accordingly,the need for efficient secret key generation and management mechanism for secured communication among computationally weak wireless devices has motivated the introduction of new authentication protocols.Recently,there has been a great interest in physical layer based secret key generation schemes by utilizing channel reciprocity.Consequently,it is observed that the sequence generated by two communicating parties contain mismatched bits which need to be reconciled by exchanging information over a public channel.This can be an immense security threat as it may let an adversary attain and recover segments of the key in known channel conditions.We proposed Hopper-Blum based physical layer(HB-PL)authentication scheme in which an enhanced physical layer key generation method integrates the Hopper-Blum(HB)authentication protocol.The information collected from the shared channel is used as secret keys for the HB protocol and the mismatched bits are used as the induced noise for learning parity with noise(LPN)problem.The proposed scheme aims to provide a way out for bit reconciliation process without leakage of information over a public channel.Moreover,HB protocol is computationally efficient and simple which helps to reduce the number of exchange messages during the authentication process.We have performed several experiments which show that our proposed design can generate secret keys with improved security strength and high performance in comparison to the current authentication techniques.Our scheme requires less than 55 exchange messages to achieve more than 95%of correct authentication.
基金This study was funded by the Deanship of Scientific Research,Taif University Researchers Supporting project number(TURSP-2020/195)Taif University,Taif,Saudi Arabia.The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/25/43)+1 种基金The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR02)The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.
文摘Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems(CPES).At the same time,the rising ubiquity of wireless sensor networks(WSN)in several application areas makes it a vital part of the design of CPES.Since security and energy efficiency are the major challenging issues in CPES,this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms(EASCPSMA).The presented EASCPS-MA technique intends to attain lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm(IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation(RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.
基金Project(2012B091100444)supported by the Production,Education and Research Cooperative Program of Guangdong Province and Ministry of Education,ChinaProject(2013ZM0091)supported by Fundamental Research Funds for the Central Universities of China
文摘To cope with the task scheduling problem under multi-task and transportation consideration in large-scale service oriented manufacturing systems(SOMS), a service allocation optimization mathematical model was established, and then a hybrid discrete particle swarm optimization-genetic algorithm(HDPSOGA) was proposed. In SOMS, each resource involved in the whole life cycle of a product, whether it is provided by a piece of software or a hardware device, is encapsulated into a service. So, the transportation during production of a task should be taken into account because the hard-services selected are possibly provided by various providers in different areas. In the service allocation optimization mathematical model, multi-task and transportation were considered simultaneously. In the proposed HDPSOGA algorithm, integer coding method was applied to establish the mapping between the particle location matrix and the service allocation scheme. The position updating process was performed according to the cognition part, the social part, and the previous velocity and position while introducing the crossover and mutation idea of genetic algorithm to fit the discrete space. Finally, related simulation experiments were carried out to compare with other two previous algorithms. The results indicate the effectiveness and efficiency of the proposed hybrid algorithm.
文摘with the development of science and technology, smart home systems require better, faster to meet the needs of human. In order to achieve this goal, the human-machine-items all need to interact each other with understand, efficient and speedy. Cps could unify combination with the human-machine-items; realize the interaction between the physical nformation and the cyber world. However, information interaction and the control task needs to be completed in a valid time. Therefore, the transform delay control strategy becomes more and more important. This paper analysis Markov delay control strategy for smart home systems, which might help the system decrease the transmission delay.
基金supported in part by the Science and Technology development fund(FDCT)of Macao(011/2017/A)the National Natural Science Foundation of China(61803397)。
文摘Smart manufacturing refers to optimization techniques that are implemented in production operations by utilizing advanced analytics approaches. With the widespread increase in deploying industrial internet of things(IIOT) sensors in manufacturing processes, there is a progressive need for optimal and effective approaches to data management.Embracing machine learning and artificial intelligence to take advantage of manufacturing data can lead to efficient and intelligent automation. In this paper, we conduct a comprehensive analysis based on evolutionary computing and neural network algorithms toward making semiconductor manufacturing smart.We propose a dynamic algorithm for gaining useful insights about semiconductor manufacturing processes and to address various challenges. We elaborate on the utilization of a genetic algorithm and neural network to propose an intelligent feature selection algorithm. Our objective is to provide an advanced solution for controlling manufacturing processes and to gain perspective on various dimensions that enable manufacturers to access effective predictive technologies.
基金supported,in part,by Science Foundation Ireland grant 10/CE/I1855 to Lero -the Irish Software Engineering Research Centre(www.lero.ie)
文摘The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions.
基金This study was jointly supported by National Science Foundation of China(41661144039,41875027 and 41871238).
文摘Snow cover is an important parameter in the fields of computer modeling,engineering technology and energy development.With the extensive growth of novel hardware and software compositions creating smart,cyber physical systems’(CPS)efficient end-to-end workflows.In order to provide accurate snow detection results for the CPS’s terminal,this paper proposed a snow cover detection algorithm based on the unsupervised Gaussian mixture model(GMM)for the FY-4A satellite data.At present,most snow cover detection algorithms mainly utilize the characteristics of the optical spectrum,which is based on the normalized difference snow index(NDSI)with thresholds in different wavebands.These algorithms require a large amount of manually labeled data for statistical analysis to obtain the appropriate thresholds for the study area.Consideration must be given to both the high and low elevations in the study area.It is difficult to extract all snow by a fixed threshold in mountainous and rugged terrains.In this research,we avoid relying on a manual analysis for different elevations.Therefore,an algorithm based on the GMM is proposed,integrating the threshold-based algorithm and the GMM.First,the threshold-based algorithm with transferred thresholds from other satellites’analysis results are used to coarsely classify the surface objects.These results are then used to initialize the parameters of the GMM.Finally,the parameters of that model are updated by an expectation-maximum(EM)iteration algorithm,and the final results are outputted when the iterative conditions end.The results show that this algorithm can adjust itself to mountainous terrain with different elevations,and exhibits a better performance than the threshold-based algorithm.Compared with orbit satellites’snow products,the accuracy of the algorithm used for FY-4A is improved by nearly 2%,and the snow detection rate is increased by nearly 6%.Moreover,compared with microwave sensors’snow products,the accuracy is increased by nearly 3%.The validation results show that the proposed algorithm can be adapted to a complex terrain environment in mountainous areas and exhibits good performance under a transferred threshold without manually assigned labels.
文摘This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.
文摘Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancementsmade in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.tend to develop CPS as a proficient model for healthcare applications especially,home patient care.Though several techniques have been proposed earlier related to CPS structures,only a handful of studies has focused on the design of CPS models for health care sector.So,the proposal for a dedicated CPS model for healthcare sector necessitates a significant interest to ensure data privacy.To overcome the challenges,the current research paper designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS(DLIDIC-SCPS)model for healthcare sector.The aim of the proposed DLIDIC-SCPS model is to achieve secure image transmission and image classification process for CPS in healthcare sector.Primarily,data acquisition takes place with the help of sensors and detection of intrusions is performed using Fuzzy Deep Neural Network(FDNN)technique.Besides,Multiple Share Creation(MSC)approach is used to create several shares of medical image so as to accomplish security.Also,blockchain is employed as a distributed data storage entity to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network(FWNN)is utilized that diagnose the disease from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is utilized to fine tune the parameters involved in WNN model,thereby boosting its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS technique.The simulation outcomes confirm that DLIDIC-SCPS approach demonstrates promising results in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.
基金Supported by National Natural Science Foundation of China(61873006,61673053)National Key Research and Development Project(2018YFC1602704,2018YFB1702704)。
文摘In order to improve the slurry pH control accuracy of the absorption tower in the wet flue gas desulfurization process,a model free adaptive predictive control algorithm for the desulfurization slurry pH which is based on a cyber physical systems framework is proposed.First,aiming to address system characteristics of non-linearity and pure hysteresis in slurry pH change process,a model free adaptive predictive control algorithm based on compact form dynamic linearization is proposed by combining model free adaptive control algorithm with model predictive control algorithm.Then,by integrating information resources with the physical resources in the absorption tower slurry pH control process,an absorption tower slurry pH optimization control system based on cyber physical systems is constructed.It is turned out that the model free adaptive predictive control algorithm under the framework of the cyber physical systems can effectively realize the high-precision tracking control of the slurry pH of the absorption tower,and it has strong robustness.
文摘The advanced and personalised experience that modern cars offer makes them more and more data-hungry.For example,the cabin preferences of the possible drivers must be recorded and associated to some identity,while such data could be exploited to deduce sensitive information about the driver’s health.Therefore,drivers’privacy must be taken seriously,requiring a dedicated risk assessment framework,as presented in this paper through a double assessment combining the asset-oriented ISO approach with the threat-oriented STRIDE approach.The framework is tailored to the level of specific car brand and demonstrated on the ten top-selling brands as well as,due to its innovative character,Tesla.The two approaches yield different,but complementary findings,demonstrating the additional insights gained through their parallel adoption.
基金This paper was funded by the Key Program of the National Natural Science Foundation of China(Grant No.U2001201)the Project funded by China Postdoctoral Science Foundation(Grant No.2022M712591)the Fundamental Research Funds for the Central Universities.
文摘Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal manufacturing environments,which poses great challenges to manufacturing enterprises.Fortunately,recent advances in the Industrial Internet of Things(IIoT)and the widespread use of embedded processors and sensors in factories enable collecting real-time manufacturing status data and building cyber–physical systems for smart,flexible,and resilient manufacturing systems.In this context,this paper investigates the mechanisms and methodology of self-organization and self-adaption to tackle exceptions and disturbances in discrete manufacturing processes.Specifically,a general model of smart manufacturing complex networks is constructed using scale-free networks to interconnect heterogeneous manufacturing resources represented by network vertices at multiple levels.Moreover,the capabilities of physical manufacturing resources are encapsulated into virtual manufacturing services using cloud technology,which can be added to or removed from the networks in a plug-and-play manner.Materials,information,and financial assets are passed through interactive links across the networks.Subsequently,analytical target cascading is used to formulate the processes of self-organizing optimal configuration and self-adaptive collaborative control for multilevel key manufacturing resources while particle swarm optimization is used to solve local problems on network vertices.Consequently,an industrial case based on a Chinese engine factory demonstrates the feasibility and efficiency of the proposed model and method in handling typical exceptions.The simulation results show that the proposed mechanism and method outperform the event-triggered rescheduling method,reducing manufacturing cost,manufacturing time,waiting time,and energy consumption,with reasonable computational time.This work potentially enables managers and practitioners to implement active perception,active response,self-organization,and self-adaption solutions in discrete manufacturing enterprises.
基金supported by the National Natural Science Foundation of China(No.62072174)the National Natural Science Foundation of Hunan Province,China(No.2020JJ5370)Scientific Research Fund of Hunan Provincial Education Department,China(Nos.17C0959 and 18C0016)
文摘With the rapid development of human society, the urbanization of the world’s population is also progressing rapidly. Urbanization has brought many challenges and problems to the development of cities. For example, the urban population is under excessive pressure, various natural resources and energy are increasingly scarce, and environmental pollution is increasing, etc. However, the original urban model has to be changed to enable people to live in greener and more sustainable cities, thus providing them with a more convenient and comfortable living environment. The new urban framework, the smart city, provides excellent opportunities to meet these challenges,while solving urban problems at the same time. At this stage, many countries are actively responding to calls for smart city development plans. This paper investigates the current stage of the smart city. First, it introduces the background of smart city development and gives a brief definition of the concept of the smart city. Second, it describes the framework of a smart city in accordance with the given definition. Finally, various intelligent algorithms to make cities smarter, along with specific examples, are discussed and analyzed.
文摘Many competing approaches exist in evaluating sensor network solutions differing by levels of ease of use, cost, control, and realism. Existing work concentrates on simulating network protocols or emulating processing units at the machine cycle level. However, little has been done to emulate the sensors and the physical environments that they monitor. The main contribution of this work is the design of WiserEmulator, an emulation framework for structural health monitoring, which gracefully balances the trade-offs between realism, controllability, and cost. WiserEmulator consists of two main components -- a testbed of wireless sensor nodes and a software emulation environment. To emulate the excitation and response of piezo-electric transducers, as well as the wave propagation inside concrete structures, the COMSOL Multi-Physics software was utilized. Digitized sensing output from COMSOL was played back via a multi-channel Digital-to-Analog Converter (DAC) connected to the wireless sensor testbed. In addition to the emulation of concrete structures, WiSeREmulator also allows users to choose pre- stored data collected from field experiments and synthesized data. A user-friendly Graphical User Interface (GUI) was developed that facilitates intuitive configurations of experimental settings, control of the on-set and progression of the experiments, and real-time visualization of experimental results. We have implemented WiSeREmulator in MATLAB. This work advances the state of the art in providing low cost solutions to evaluating Cyber Physical Systems such as wireless structural health monitoring networks.