-
441
LQG control-aware resource scheduling method for IEEE 802.11ax networks
Published 2024-03-01“…Due to the advantages in low cost, ease of maintenance and license-exempt spectrum, etc, IEEE 802.11ax is widely adopted in industrial control applications.For a wireless networked control system based on IEEE 802.11ax, a control-aware resource scheduling method was proposed to support the wireless high-speed control of multiple control systems.Firstly, considering the packet dropout problem of sensing data in IEEE 802.11ax, the optimal state estimator and the linear quadratic Gaussian (LQG) control of the studied control system were given.Secondly, the dependency between the LQG performance and the transmission reliability of IEEE 802.11ax was analyzed, the expected LQG performance minimization problem of resource scheduling was formulated, and further, an LQG control-aware resource scheduling (LCARS) method was proposed.Finally, the effectiveness of the LCARS method was demonstrated via extensive simulations.LCARS can be applied to smart factory applications including navigation of automated guided vehicles, remote control of robots and so on.…”
Get full text
Article -
442
M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system
Published 2019-10-01“…The proposed m-folding method–based elliptic curve encryption showed 50% faster encryption than the existing methods.…”
Get full text
Article -
443
-
444
Region-of-Interest Extraction Method to Increase Object-Detection Performance in Remote Monitoring System
Published 2025-05-01Get full text
Article -
445
Dynamic Prediction Method for Ground Settlement of Reclaimed Airports Based on Grey System Theory
Published 2025-03-01Get full text
Article -
446
TSM-TLHS Prediction Method for Assembly Deformation of Large Curved Thin Plates in Shipbuilding
Published 2025-08-01Get full text
Article -
447
End-to-end throughput evaluation model and optimization method for dual-mode mesh network
Published 2025-07-01Get full text
Article -
448
Detection Method for Three-Phase Electricity Theft Based on Multi-Dimensional Feature Extraction
Published 2024-09-01“…The advent of smart grids has facilitated data-driven methods for detecting electricity theft, with a preponderance of research efforts focused on user electricity consumption data. …”
Get full text
Article -
449
Hybridized Brazilian–Bowein type spectral gradient projection method for constrained nonlinear equations
Published 2024-12-01Get full text
Article -
450
An LSTM-driven thermoelectric coupling response prediction method for shape memory alloy actuators
Published 2025-05-01“…Unlike conventional approaches, our method decouples material behavior prediction from actuator geometry: A single-layer LSTM network processes voltage-time sequences to predict SMA wire’s temperature and resistance dynamics, while a physics-based model computes angular displacement through phase transformation and constitutive equations. …”
Get full text
Article -
451
An Enhanced Forwarding Method based on Intelligent Water Drops Algorithm in Named Data Network
Published 2021-12-01Get full text
Article -
452
Load identification method based on one class classification combined with fuzzy broad learning
Published 2022-05-01“…Non-Intrusive Load Monitoring(NILM) is a key technology for smart electricity consumption, which helps strengthen load-side management and improve electricity efficiency. …”
Get full text
Article -
453
An Integrated Method for High-Dimensional Imbalanced Assembly Quality Prediction Supported by Edge Computing
Published 2020-01-01“…Traditional prediction methods of assembly quality mainly focus on building classification or regression models with high accuracy. …”
Get full text
Article -
454
A Novel Method for Short-Circuit Current Suppression Based on Instant System Reconstruction
Published 2025-01-01“…The simulation result shows the effectiveness of the proposed method.…”
Get full text
Article -
455
Developing a hybrid feature selection method to detect botnet attacks in IoT devices
Published 2024-07-01“…This article aims to develop a hybrid feature selection method to find the most influential features based on three feature selection methods, correlation, generalized normal distribution optimization, and lasso, to detect botnet attacks in IoT devices. …”
Get full text
Article -
456
Optimization method for remaining life prediction of conventional circuit breaker based on deep learning
Published 2025-05-01“…In the context of smart grid, aiming at the condition monitoring of conventional circuit breakers with complex mechanical actions, an optimization method for remaining life prediction of conventional circuit breaker based on deep learning is proposed. …”
Get full text
Article -
457
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01“…The examples under the public dataset containing 8 kinds of malware show that the proposed method is better than the traditional algorithmic model, and can accurately and efficiently achieve malware detection with strong generalization ability.…”
Get full text
Article -
458
Truck Lifting Accident Detection Method Based on Improved PointNet++ for Container Terminals
Published 2025-01-01Get full text
Article -
459
A Technical Overview on Beta-Attenuation Method for the Monitoring of Particulate Matter in Ambient Air
Published 2022-08-01“…Like any other technique, this method has several limitations that have been recorded in many studies. …”
Get full text
Article -
460
A Semantically Enhanced Label Prediction Method for Imbalanced POI Data Category Distribution
Published 2024-10-01Get full text
Article