Showing 441 - 460 results of 6,470 for search 'smart (method OR methods)', query time: 0.15s Refine Results
  1. 441

    LQG control-aware resource scheduling method for IEEE 802.11ax networks by Meng ZHENG, Lei ZHANG, Wei LIANG

    Published 2024-03-01
    “…Due to the advantages in low cost, ease of maintenance and license-exempt spectrum, etc, IEEE 802.11ax is widely adopted in industrial control applications.For a wireless networked control system based on IEEE 802.11ax, a control-aware resource scheduling method was proposed to support the wireless high-speed control of multiple control systems.Firstly, considering the packet dropout problem of sensing data in IEEE 802.11ax, the optimal state estimator and the linear quadratic Gaussian (LQG) control of the studied control system were given.Secondly, the dependency between the LQG performance and the transmission reliability of IEEE 802.11ax was analyzed, the expected LQG performance minimization problem of resource scheduling was formulated, and further, an LQG control-aware resource scheduling (LCARS) method was proposed.Finally, the effectiveness of the LCARS method was demonstrated via extensive simulations.LCARS can be applied to smart factory applications including navigation of automated guided vehicles, remote control of robots and so on.…”
    Get full text
    Article
  2. 442

    M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system by Taehoon Do, Seungwoo Park, Jaehwan Lee, Sangoh Park

    Published 2019-10-01
    “…The proposed m-folding method–based elliptic curve encryption showed 50% faster encryption than the existing methods.…”
    Get full text
    Article
  3. 443
  4. 444
  5. 445
  6. 446
  7. 447
  8. 448

    Detection Method for Three-Phase Electricity Theft Based on Multi-Dimensional Feature Extraction by Wei Bai, Lan Xiong, Yubei Liao, Zhengyang Tan, Jingang Wang, Zhanlong Zhang

    Published 2024-09-01
    “…The advent of smart grids has facilitated data-driven methods for detecting electricity theft, with a preponderance of research efforts focused on user electricity consumption data. …”
    Get full text
    Article
  9. 449
  10. 450

    An LSTM-driven thermoelectric coupling response prediction method for shape memory alloy actuators by Shaozhe Ding, Longbin Liu, Shifeng Zhang, Mingkun Li

    Published 2025-05-01
    “…Unlike conventional approaches, our method decouples material behavior prediction from actuator geometry: A single-layer LSTM network processes voltage-time sequences to predict SMA wire’s temperature and resistance dynamics, while a physics-based model computes angular displacement through phase transformation and constitutive equations. …”
    Get full text
    Article
  11. 451
  12. 452

    Load identification method based on one class classification combined with fuzzy broad learning by Wang Yi, Wang Xiaoyang, Li Songnong, Chen Tao, Hou Xingzhe, Fu Xiuyuan

    Published 2022-05-01
    “…Non-Intrusive Load Monitoring(NILM) is a key technology for smart electricity consumption, which helps strengthen load-side management and improve electricity efficiency. …”
    Get full text
    Article
  13. 453

    An Integrated Method for High-Dimensional Imbalanced Assembly Quality Prediction Supported by Edge Computing by Yixiong Feng, Tianyue Wang, Bingtao Hu, Chen Yang, Jianrong Tan

    Published 2020-01-01
    “…Traditional prediction methods of assembly quality mainly focus on building classification or regression models with high accuracy. …”
    Get full text
    Article
  14. 454

    A Novel Method for Short-Circuit Current Suppression Based on Instant System Reconstruction by Gang Xu, Xin Qie, Bin Han, Hua Xie, Wenjie Wang, Yue Yu, Jie Hu

    Published 2025-01-01
    “…The simulation result shows the effectiveness of the proposed method.…”
    Get full text
    Article
  15. 455

    Developing a hybrid feature selection method to detect botnet attacks in IoT devices by Alshaeaa H.Y., Ghadhban Z.M., Ministry of Education, Iraq

    Published 2024-07-01
    “…This article aims to develop a hybrid feature selection method to find the most influential features based on three feature selection methods, correlation, generalized normal distribution optimization, and lasso, to detect botnet attacks in IoT devices. …”
    Get full text
    Article
  16. 456

    Optimization method for remaining life prediction of conventional circuit breaker based on deep learning by SUN Shuguang, WEI Shuo, WANG Jingqin, SHAO Xu, SUN Liang, GAO Hui

    Published 2025-05-01
    “…In the context of smart grid, aiming at the condition monitoring of conventional circuit breakers with complex mechanical actions, an optimization method for remaining life prediction of conventional circuit breaker based on deep learning is proposed. …”
    Get full text
    Article
  17. 457

    A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network by Zheng Yang, Hua Zhu, Zhao Li, Gang Wang, Meng Su

    Published 2024-01-01
    “…The examples under the public dataset containing 8 kinds of malware show that the proposed method is better than the traditional algorithmic model, and can accurately and efficiently achieve malware detection with strong generalization ability.…”
    Get full text
    Article
  18. 458
  19. 459

    A Technical Overview on Beta-Attenuation Method for the Monitoring of Particulate Matter in Ambient Air by Kritika Shukla, Shankar G. Aggarwal

    Published 2022-08-01
    “…Like any other technique, this method has several limitations that have been recorded in many studies. …”
    Get full text
    Article
  20. 460