Template-Type: ReDIF-Article 1.0 Author-Name: Magnus Egerstedt Author-X-Name-First: Magnus Author-X-Name-Last: Egerstedt Title: From algorithms to architectures in cyber-physical networks Abstract: In this paper, we provide a formalism for cyber-physical networks (CPN) that explicitly calls out the dynamic and the computational aspects of such networks, thus allowing for questions concerning algorithms and architectures to be asked in a systematic manner. The developments are motivated by a power-balancing example over the power grid, and a number of general, CPN-relevant questions are posed using the proposed formalism. Journal: Cyber-Physical Systems Pages: 67-75 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2015.1056234 File-URL: http://hdl.handle.net/10.1080/23335777.2015.1056234 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:67-75 Template-Type: ReDIF-Article 1.0 Author-Name: Xiaotian Wang Author-X-Name-First: Xiaotian Author-X-Name-Last: Wang Author-Name: Zhenwu Shi Author-X-Name-First: Zhenwu Author-X-Name-Last: Shi Author-Name: Fumin Zhang Author-X-Name-First: Fumin Author-X-Name-Last: Zhang Author-Name: Yue Wang Author-X-Name-First: Yue Author-X-Name-Last: Wang Title: Dynamic real-time scheduling for human-agent collaboration systems based on mutual trust Abstract: Mutual trust is a key factor in human–human collaboration. Inspired by this social interaction, we analyse human–agent mutual trust in the collaboration of human and (semi)autonomous multi-agent systems. Human–agent mutual trust should be bidirectional and determines the human’s acceptance and hence use of autonomous agents as well as agents’ willingness to take human’s command. It is especially important when a human collaborates with multiple agents concurrently. In this paper, we derive time-series human–agent mutual trust models based on results from human factors engineering. To avoid both ‘over-trust’ and ‘under-trust’, we set up dynamic timing models for the multi-agent scheduling problem and develop necessary and sufficient conditions to test the schedulability of the human multi-agent collaborative task. Our simulation results show that the proposed algorithm guarantees effective real-time scheduling of the human multi-agent collaboration system while ensuring a proper level of human–agent mutual trust. Journal: Cyber-Physical Systems Pages: 76-90 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2015.1056755 File-URL: http://hdl.handle.net/10.1080/23335777.2015.1056755 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:76-90 Template-Type: ReDIF-Article 1.0 Author-Name: Liang Zhao Author-X-Name-First: Liang Author-X-Name-Last: Zhao Author-Name: Wen-Zhan Song Author-X-Name-First: Wen-Zhan Author-X-Name-Last: Song Author-Name: Lei Shi Author-X-Name-First: Lei Author-X-Name-Last: Shi Author-Name: Xiaojing Ye Author-X-Name-First: Xiaojing Author-X-Name-Last: Ye Title: Decentralised seismic tomography computing in cyber-physical sensor systems Abstract: This paper presents an innovative decentralised seismic tomography computing paradigm in cyber-physical sensor systems, where each sensor node computes the tomography based on its partial information and through gossip with local neighbours only. The key challenge is the potential high communication overhead due to limited knowledge of each node about the entire network topology and information. The aim of this paper is to develop efficient algorithms for maximising the quality of tomography resolution while minimising the communication cost. We reformulate the conventional seismic tomography problem and exploit the alternating direction method of multipliers method to design two distributed algorithms. One is a synchronous algorithm and the other is asynchronous and more fault-tolerant and scalable. We theoretically prove that both proposed algorithms can reach their convergent solutions in a linear rate in terms of the number of communication rounds. Extensive evaluations on both synthetic and real data-sets validate the superior efficiency of the proposed algorithms. They not only achieve near-optimal (compare to centralised solution) high-quality tomography but also retain low communication cost even in sparse networks. Journal: Cyber-Physical Systems Pages: 91-112 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2015.1062049 File-URL: http://hdl.handle.net/10.1080/23335777.2015.1062049 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:91-112 Template-Type: ReDIF-Article 1.0 Author-Name: Guoming Tang Author-X-Name-First: Guoming Author-X-Name-Last: Tang Author-Name: Kui Wu Author-X-Name-First: Kui Author-X-Name-Last: Wu Author-Name: Jingsheng Lei Author-X-Name-First: Jingsheng Author-X-Name-Last: Lei Author-Name: Weidong Xiao Author-X-Name-First: Weidong Author-X-Name-Last: Xiao Title: SHARK: sparse human action recovery with knowledge of appliances and load curve data Abstract: Occupancy detection can greatly facilitate heating, ventilation and cooling and lightning control for building energy saving. Sensor-based occupancy detection is usually costly and may suffer from high false positive rates. As such, occupancy detection using load curve data has been proposed. Such methods, however, normally (i) rely on tedious and nontrivial model training process and (ii) do not consider the influence of corrupted data in load curve. To overcome these pitfalls, we develop a practical, robust non-intrusive occupancy detection approach that does not require model training and data cleansing. Only using load curve data and readily available appliance knowledge, the method achieves occupancy detection by three main steps: (i) the appliances’ mode states are firstly decoded via a carefully designed robust sparse switching event recovering model; (ii) the human actions are recovered with a priori knowledge of human-activated switching events; (iii) the occupancy states are then inferred based on the recovered human actions along with empirical strategies and association rules. We evaluate our approach and compare it with existing methods with real-world data. The results show that our approach can achieve similar performance to those using supervised machine learning. Journal: Cyber-Physical Systems Pages: 113-131 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2015.1114526 File-URL: http://hdl.handle.net/10.1080/23335777.2015.1114526 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:113-131 Template-Type: ReDIF-Article 1.0 Author-Name: Devi Archana Paladugu Author-X-Name-First: Devi Archana Author-X-Name-Last: Paladugu Author-Name: Qiongjie Tian Author-X-Name-First: Qiongjie Author-X-Name-Last: Tian Author-Name: Hima Bindu Maguluri Author-X-Name-First: Hima Bindu Author-X-Name-Last: Maguluri Author-Name: Baoxin Li Author-X-Name-First: Baoxin Author-X-Name-Last: Li Title: Towards building an automated system for describing indoor floor maps for individuals with visual impairment Abstract: The ability to navigate is an integral part of everyday life, which is one of the major challenges faced by individuals with visual impairment. While navigating indoors is relatively safer, it is a stressful exercise if the building is unfamiliar, especially since typical means like canes, seeing-dogs and GPS devices do not really help. This article presents an automated approach that aids a visually impaired individual in obtaining information from a floor map, prior to visiting large buildings like a library. The key is to automatically produce verbal descriptions from a floor map and use that to help the person to form a cognitive map of the building to be visited. The proposed method is fully automated, which only requires the user to input the name of the building/establishment. The system then searches the Web for a floor map. If a map is found, the map is downloaded and used by the system to generate a verbal description giving an overview of the layout of the building, including entrances/exits and other important landmarks inside the building. A prototype system was built and evaluated with a group of 18 visually impaired people. Feedback obtained from the visually impaired participants in our experiments suggests that the proposed approach is an effective aid in helping the users forming an approximate cognitive map of the location before visiting the location. Journal: Cyber-Physical Systems Pages: 132-159 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2016.1141801 File-URL: http://hdl.handle.net/10.1080/23335777.2016.1141801 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:132-159 Template-Type: ReDIF-Article 1.0 Author-Name: Ruoyu Su Author-X-Name-First: Ruoyu Author-X-Name-Last: Su Author-Name: Ramachandran Venkatesan Author-X-Name-First: Ramachandran Author-X-Name-Last: Venkatesan Author-Name: Cheng Li Author-X-Name-First: Cheng Author-X-Name-Last: Li Title: An energy-efficient relay node selection scheme for underwater acoustic sensor networks Abstract: Underwater acoustic sensor networks (UWSNs) have many important applications, such as natural resource development, geological oceanography and environmental monitoring. Information collected by sensor nodes must be transmitted to sink node(s) directly or through intermediate nodes. Energy efficiency is a challenging issue for UWSNs because their batteries cannot be removed and are difficult to recharge. Thus, selecting energy-efficient paths from source nodes to sink node(s) is crucial in routing for UWSNs. In this paper, we propose a scheme of relay node selection in UWSNs with a square grid topology for long-term marine monitoring applications. First, we formulate the relay node selection problem as a linear programming problem, where the objective is to maximise the network lifetime. Then, we propose a routing metric that reflects both the transmitting power level and the residual energy of the two-end nodes of each acoustic link. Finally, we evaluate the performance of the proposed relay node selection scheme for different network sizes and different initial battery energy assignments. The simulation results show that the proposed relay node selection scheme can prolong the network lifetime of different network sizes. Compared to a routing algorithm solely based on minimum hop, the performance of the proposed scheme is closer to the optimal value obtained by solving the linear programming problem. Moreover, the network lifetime is further increased if we allow nodes to have different initial energy values based on their work loads. Journal: Cyber-Physical Systems Pages: 160-179 Issue: 2-4 Volume: 1 Year: 2015 Month: 10 X-DOI: 10.1080/23335777.2016.1145742 File-URL: http://hdl.handle.net/10.1080/23335777.2016.1145742 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:1:y:2015:i:2-4:p:160-179 Template-Type: ReDIF-Article 1.0 Author-Name: Md. Mizanur Rahman Author-X-Name-First: Md. Mizanur Author-X-Name-Last: Rahman Author-Name: Jelena Mišić Author-X-Name-First: Jelena Author-X-Name-Last: Mišić Author-Name: Vojislav B. Mišić Author-X-Name-First: Vojislav B. Author-X-Name-Last: Mišić Title: Two-hop communications in a cognitive radio network Abstract: In this paper, we describe an efficient bridging protocol for interconnection of cognitive personal area networks (CPANs) and evaluate its performance through probabilistic analysis. We also take into account the impact of collisions with primary user transmissions through probabilistic analysis and renewal theory. As the bridge roams between CPANs at will (i.e. without predefined scheduling), performance of both local and non-local traffic in either CPAN depends on the local and non-local traffic intensities. The results also show that the collisions with primary source transmissions do not affect bridge performance at low to medium CPAN traffic. Journal: Cyber-Physical Systems Pages: 1-23 Issue: 1-4 Volume: 2 Year: 2016 Month: 10 X-DOI: 10.1080/23335777.2016.1189458 File-URL: http://hdl.handle.net/10.1080/23335777.2016.1189458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:2:y:2016:i:1-4:p:1-23 Template-Type: ReDIF-Article 1.0 Author-Name: Tansel Yucelen Author-X-Name-First: Tansel Author-X-Name-Last: Yucelen Author-Name: Wassim M. Haddad Author-X-Name-First: Wassim M. Author-X-Name-Last: Haddad Author-Name: Eric M. Feron Author-X-Name-First: Eric M. Author-X-Name-Last: Feron Title: Adaptive control architectures for mitigating sensor attacks in cyber-physical systems Abstract: The accuracy of sensor measurements is critical to the design of high-performance control systems since sensor uncertainties can significantly deteriorate achievable closed-loop dynamical system performance. Sensor uncertainty can arise due to low sensor quality, sensor failure or detrimental environmental conditions. For example, relatively cheap sensor suites are used for low-cost, small-scale unmanned vehicle applications that can result in inaccurate sensor measurements. Alternatively, sensor measurements can also be corrupted by malicious attacks if dynamical systems are controlled through large-scale, multilayered communication networks as is the case in cyber-physical systems. This paper presents several adaptive control architectures for stabilisation of linear dynamical systems in the presence of sensor uncertainty and sensor attacks. Specifically, we propose new and novel adaptive controllers for state-independent and state-dependent sensor uncertainties. In particular, we show that the proposed controllers guarantee asymptotic stability of the closed-loop dynamical system when the sensor uncertainties are time-invariant and uniform ultimate boundedness when the uncertainties are time-varying. We further discuss the practicality of the proposed approaches and provide several numerical examples to illustrate the efficacy of the proposed adaptive control architectures. Journal: Cyber-Physical Systems Pages: 24-52 Issue: 1-4 Volume: 2 Year: 2016 Month: 10 X-DOI: 10.1080/23335777.2016.1244562 File-URL: http://hdl.handle.net/10.1080/23335777.2016.1244562 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:2:y:2016:i:1-4:p:24-52 Template-Type: ReDIF-Article 1.0 Author-Name: Mohammad Shahnoor Islam Khan Author-X-Name-First: Mohammad Shahnoor Islam Author-X-Name-Last: Khan Author-Name: Jelena Mišić Author-X-Name-First: Jelena Author-X-Name-Last: Mišić Title: Zoning based block service policy in a MAC protocol with RF recharging Abstract: Among the main problems in radio frequency based recharging, which is being increasingly used to extend maintenance-free operation of wireless sensor networks, is the dependence of the recharge level on the distance of the node in question from the node that emits the recharging pulse. To address this, we propose a zoning scheme in which the polling patterns and service policy differ from zone to zone in order to reduce the energy consumption of more distant nodes so as to match their lower recharge increment. We analyse the performance of the proposed scheme through probabilistic analysis and renewal theory, and show that it leads to equalisation of node lifetimes and extends the time interval between recharge pulses. We also discuss the possibility of addition of helper recharging nodes. Journal: Cyber-Physical Systems Pages: 53-74 Issue: 1-4 Volume: 2 Year: 2016 Month: 10 X-DOI: 10.1080/23335777.2017.1282984 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1282984 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:2:y:2016:i:1-4:p:53-74 Template-Type: ReDIF-Article 1.0 Author-Name: Vivek Kant Author-X-Name-First: Vivek Author-X-Name-Last: Kant Title: Cyber-physical systems as sociotechnical systems: a view towards human–technology interaction Abstract: The aim of this paper is to provide a conceptual formulation of a cyber-physical system (CPS) as a sociotechnical system (STS). CPS has become a major area for research and development; however, for successful integration with society, the sociotechnical dimension of CPS should be addressed. Examining basic issues will provide a strong foundation for CPS technologies along with providing stakeholder acceptance and engagement for wellbeing of society. While CPS can be considered as subsets of STS, they are not merely an application of STS principles. Rather, as this article demonstrates, considerations of fundamental principles involve a careful scrutiny of basic assumptions. This paper examines the basic assumptions involved in STS based on insights derived from a multitude of fields ranging from human–computer interaction, risk management, history of technology, philosophy of technology, science and technology studies and systems engineering. Further, based on sociotechnical models from three different fields, and in light of the basic assumptions of STS, a conceptual model of CPS is presented. This model is devised with a view towards human–technology interaction in CPS. It consists of technology and societal elements as hybrid entities available at several levels of functional abstraction. Using already existing example of CPS projects, the applicability of the proposed conceptual model is demonstrated. The paper concludes with a discussion of three main future challenges for human–technology interaction in CPS. Journal: Cyber-Physical Systems Pages: 75-109 Issue: 1-4 Volume: 2 Year: 2016 Month: 10 X-DOI: 10.1080/23335777.2017.1289983 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1289983 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:2:y:2016:i:1-4:p:75-109 Template-Type: ReDIF-Article 1.0 Author-Name: Yue Zu Author-X-Name-First: Yue Author-X-Name-Last: Zu Author-Name: Ran Dai Author-X-Name-First: Ran Author-X-Name-Last: Dai Title: Distributed path planning for building evacuation guidance Abstract: This paper proposes a distributed path planning strategy to provide guidance information for efficient building evacuation in emergency situations by utilizing a cyber-physical system (CPS) with networked sensing, information sharing, and distributed computation capabilities. The goal is to reduce casualty caused by stampedes, pushing, and squeezing during evacuation in pubic buildings when guiding evacuees from hazard zones to safe areas. By following the guidance information, evacuees are expected to transit to the exits through safe and time-efficient paths instead of rushing to the nearest exit and generating congestion along the paths and around the exits. The evacuation and hazard spreading models are built based on floor plans of an object building. The cost of each path is determined by time consumption to transit along the relative path and adjusted in real-time according to the hazard spreading model and decisions from each evacuee group. An integrated Bellman-Ford and dual subgradient algorithm is developed to find the minimum time evacuation path for scattered evacuees in a distributed manner. Simulation examples of designing the evacuation paths for occupants in Aerospace Engineering building at Iowa State University are provided to verify effectiveness of the proposed guidance strategy based on CPS. Journal: Cyber-Physical Systems Pages: 1-21 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1326983 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1326983 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:1-21 Template-Type: ReDIF-Article 1.0 Author-Name: Eirini Eleni Tsiropoulou Author-X-Name-First: Eirini Eleni Author-X-Name-Last: Tsiropoulou Author-Name: John S. Baras Author-X-Name-First: John S. Author-X-Name-Last: Baras Author-Name: Symeon Papavassiliou Author-X-Name-First: Symeon Author-X-Name-Last: Papavassiliou Author-Name: Surbhit Sinha Author-X-Name-First: Surbhit Author-X-Name-Last: Sinha Title: RFID-based smart parking management system Abstract: In this paper, the adoption of passive Radio Frequency Identification (RFID) tag-to-tag communication paradigm within the context of a smart parking system is evangelised, in terms of achieving improved energy-efficiency and operational effectiveness. To demonstrate that the joint routing and RFID readers’ transmission power minimisation problem is studied, considering tag-to-tag communication. The superiority of the proposed framework against conventional direct RFID reader-tag communication is demonstrated in terms of: (i) reduction of RFID readers’ transmission power to the minimum required to guarantee connectivity, and (ii) expansion of RFID reader’s coverage area towards communicating with more distant tags, otherwise unreachable through direct communication. Journal: Cyber-Physical Systems Pages: 22-41 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1358765 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1358765 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:22-41 Template-Type: ReDIF-Article 1.0 Author-Name: Mustafa Faisal Author-X-Name-First: Mustafa Author-X-Name-Last: Faisal Author-Name: Alvaro A. Cardenas Author-X-Name-First: Alvaro A. Author-X-Name-Last: Cardenas Title: Incomplete clustering of electricity consumption: an empirical analysis with industrial and residential datasets Abstract: In this paper, we study the role of analytics for electricity consumption in smart grids and their possible applications like detecting fraud. Using data-sets of industrial as well as residential consumers, we show how incomplete clustering can help to reduce the search space for these applications. We provide a framework for iterative incomplete clustering and illustrate results in our data-sets. We find, incomplete clustering via correlation coefficients can identify a variety of different households and industries with unique characteristics that are missed with other clustering approaches. Journal: Cyber-Physical Systems Pages: 42-65 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1386716 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1386716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:42-65 Template-Type: ReDIF-Article 1.0 Author-Name: Chao Liu Author-X-Name-First: Chao Author-X-Name-Last: Liu Author-Name: Sambuddha Ghosal Author-X-Name-First: Sambuddha Author-X-Name-Last: Ghosal Author-Name: Zhanhong Jiang Author-X-Name-First: Zhanhong Author-X-Name-Last: Jiang Author-Name: Soumik Sarkar Author-X-Name-First: Soumik Author-X-Name-Last: Sarkar Title: An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling Abstract: This paper presents a new data-driven framework for unsupervised system-wide anomaly detection for modern distributed complex systems within which there exists a strong connectivity among sub-systems, operating in diverse modes and encountering a large variety of anomalies. The framework is based on a spatiotemporal feature extraction scheme built on the concept of symbolic dynamics for discovering and representing causal interactions among subsystems. The extracted features from the spatiotemporal pattern network (STPN) are then used to learn system-wide patterns via a Restricted Boltzmann Machine (RBM), to form an energy based anomaly detection approach. While STPN is treated as a weak learner of system modes (in terms of difficulty in discovering true graphical representations), RBM is treated as a boosting approach to form a strong learner of system characteristics. Case studies with simulated data and real data from an integrated building system are used to validate the proposed approach. The results show that: (i) the increase in RBM free energy in the off-nominal conditions compared to that in the nominal conditions can be used for anomaly detection; (ii) the proposed framework formulates a strong learning model (STPN+RBM) from weak frequentist model–STPN, via boosting with RBM; and (iii) the STPN+RBM framework can capture multiple nominal operating modes of distributed complex systems with a single graphical model. Journal: Cyber-Physical Systems Pages: 66-102 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1386717 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1386717 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:66-102 Template-Type: ReDIF-Article 1.0 Author-Name: Jie You Author-X-Name-First: Jie Author-X-Name-Last: You Author-Name: Wencen Wu Author-X-Name-First: Wencen Author-X-Name-Last: Wu Title: Cooperative identification of advection–diffusion processes with spatially varying coefficients based on a multi-model structure Abstract: This work develops a practical real-time identification strategy for advection–diffusion processes with spatially varying coefficients. A novel multi-model structure that represents the processes in practical applications is proposed. The multi-model structure is parameterised as blended linear partial differential equation models. Both the offline centralised and the online distributed identification algorithms using mobile sensor networks are proposed. Trajectories for mobile sensor networks in the advection–diffusion field with spatially varying parameters are found, and distributed control laws to guide the mobile sensor networks to follow the trajectories while keeping desired formations are designed. The effectiveness of this proposed method is demonstrated in simulations. Journal: Cyber-Physical Systems Pages: 103-120 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1415979 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1415979 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:103-120 Template-Type: ReDIF-Article 1.0 Author-Name: Kanae Matsui Author-X-Name-First: Kanae Author-X-Name-Last: Matsui Title: An information provision system according to residents’ indoor comfort preferences for energy conservation Abstract: A Home Energy Management System is a key component to achieve energy efficiency on the residential side in a Smart City. The proposed system includes two processes: one to collect environmental and physical data using networked sensors, and the other to submit web-based questionnaires for calculating Predicted Mean Vote values, which is an indicator of personal comfort in homes. Another part of this system selects information obtained from the collected data every 30 min to encourage appropriate changes in personal behavior, so as to provide the preferred level of comfort. Information is generated for each resident’s comfort range. To test its applicability, the system was installed in two test households for two weeks in summer and in winter. In the first week, environmental and physical data were collected. This created a benchmark for electricity consumption. In the second week, information was provided, which was used to customize the comfort level for each person. The evaluation showed that the system contributed to a reduction in electricity consumption by approximately 13.3 %, and an increase in indoor comfort by approximately 65.5 % during both summer and winter, when electricity consumption peaks and indoor comfort is at its lowest. Journal: Cyber-Physical Systems Pages: 121-142 Issue: 1-4 Volume: 3 Year: 2017 Month: 10 X-DOI: 10.1080/23335777.2017.1415980 File-URL: http://hdl.handle.net/10.1080/23335777.2017.1415980 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:3:y:2017:i:1-4:p:121-142 Template-Type: ReDIF-Article 1.0 Author-Name: Jonghoek Kim Author-X-Name-First: Jonghoek Author-X-Name-Last: Kim Author-Name: Sanghoek Kim Author-X-Name-First: Sanghoek Author-X-Name-Last: Kim Author-Name: Youngmin Choo Author-X-Name-First: Youngmin Author-X-Name-Last: Choo Title: Stealth path planning for a high speed torpedo-shaped autonomous underwater vehicle to approach a target ship Abstract: Let us consider a scenario where a high speed torpedo-shaped autonomous underwater vehicle (AUV) approaches a target ship. In an underwater environment, radio waves are easily dissipated. Thus, sound is the main energy transmitted from the AUV to the target ship. We plan the path of the AUV to reduce both the time required to meet the target ship and the AUV’s sound measured by the target. We consider a torpedo-shaped AUV equipped with backward propellers to move forward and fins for heading control. For this type of vehicle, there is an instantaneous maximum turn rate for its motion. In order to increase the safety of path, we plan the AUV’s path so that a sharp corner along the path is avoided. We verify the effectiveness of our stealth path planning method using MATLAB simulations. Journal: Cyber-Physical Systems Pages: 1-16 Issue: 1 Volume: 4 Year: 2018 Month: 1 X-DOI: 10.1080/23335777.2018.1431959 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1431959 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:1:p:1-16 Template-Type: ReDIF-Article 1.0 Author-Name: Yingying Yao Author-X-Name-First: Yingying Author-X-Name-Last: Yao Author-Name: Xiaolin Chang Author-X-Name-First: Xiaolin Author-X-Name-Last: Chang Author-Name: Lin Li Author-X-Name-First: Lin Author-X-Name-Last: Li Author-Name: Runkai Yang Author-X-Name-First: Runkai Author-X-Name-Last: Yang Title: CLAM: lightweight certificateless anonymous authentication mechanism for vehicular cloud services Abstract: Vehicular cloud service (VCS) is proposed to accelerate computation and storage by integrating conventional cloud services into vehicular networks. Vehicle authentication is one of the critical security challenges in the widespread deployment of VCS. The high dynamicity of vehicles and the limited resources of Vehicular networks necessitate the lower overhead not only in computation and communication but also in storage during the authentication process. This paper considers the mutual authentication between vehicle and road side unit (RSU) in the scenario where a vehicle accesses VCS via RSU. We propose a lightweight certificateless anonymous authentication mechanism (CLAM), which applies Ring-Learning-with-Errors-based password-authenticated key exchange technique. CLAM could defend against a variety of attacks while preserving the identity and location privacy of vehicles. Moreover, CLAM is lightweight in terms of small overhead in communication, computation and storage. We detail the mechanism, explain how CLAM satisfies the security requirements and apply SVO logic to verify that CLAM meets the desired authentication objectives. Simulations are also carried out to evaluate CLAM’s efficiency in terms of vehicle authentication time, by comparison with the existing authentication mechanisms. Journal: Cyber-Physical Systems Pages: 17-38 Issue: 1 Volume: 4 Year: 2018 Month: 1 X-DOI: 10.1080/23335777.2018.1431960 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1431960 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:1:p:17-38 Template-Type: ReDIF-Article 1.0 Author-Name: Xu Jin Author-X-Name-First: Xu Author-X-Name-Last: Jin Author-Name: Wassim M. Haddad Author-X-Name-First: Wassim M. Author-X-Name-Last: Haddad Author-Name: Tomohisa Hayakawa Author-X-Name-First: Tomohisa Author-X-Name-Last: Hayakawa Title: An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances Abstract: In this paper, we propose a novel adaptive control architecture for addressing security and safety in cyber-physical systems subject to exogenous disturbances. Specifically, we develop an adaptive controller for time-invariant, state-dependent adversarial sensor and actuator attacks in the face of stochastic exogenous disturbances modelled as Markov processes. We show that the proposed controller guarantees uniform ultimate boundedness of the closed-loop dynamical system in a mean-square sense. We further discuss the practicality of the proposed approach and provide a numerical example involving the lateral directional dynamics of an aircraft to illustrate the efficacy of the proposed adaptive control architecture. Journal: Cyber-Physical Systems Pages: 39-56 Issue: 1 Volume: 4 Year: 2018 Month: 1 X-DOI: 10.1080/23335777.2018.1484818 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1484818 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:1:p:39-56 Template-Type: ReDIF-Article 1.0 Author-Name: Anders Albert Author-X-Name-First: Anders Author-X-Name-Last: Albert Author-Name: Lars Imsland Author-X-Name-First: Lars Author-X-Name-Last: Imsland Title: Survey: mobile sensor networks for target searching and tracking Abstract: Mobile sensor networks can be employed in multiple applications, such as search and rescue, border patrol, battle scenarios and environmental monitoring. In this survey, we review the literature utilising mobile sensor networks in applications classified as target searching and/or tracking. Our contribution is threefold. First, we focus on the diverse types of filters applied to estimating the state of the targets. Second, we present the most common approaches to high-level trajectory planning for the sensors in the network to do target searching and/or tracking. Finally, we classify the literature based on the problem formulation used and solution characteristics. At the end of the survey, we discuss the current state of the literature and possible directions for future research efforts. Journal: Cyber-Physical Systems Pages: 57-98 Issue: 2 Volume: 4 Year: 2018 Month: 4 X-DOI: 10.1080/23335777.2018.1483969 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1483969 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:2:p:57-98 Template-Type: ReDIF-Article 1.0 Author-Name: Jiacheng Shang Author-X-Name-First: Jiacheng Author-X-Name-Last: Shang Author-Name: Jie Wu Author-X-Name-First: Jie Author-X-Name-Last: Wu Title: A real-time logo detection system using data offloading on mobile devices Abstract: In the past few years, mobile augmented reality (AR) has attracted a great deal of attention. It presents us a live, direct or indirect view of a real-world environment whose elements are augmented (or supplemented) by computer-generated sensory inputs such as sound, video, graphics or GPS data. Also, deep learning has the potential to improve the performance of current AR systems. In this paper, we propose a distributed mobile logo detection framework. Our system consists of mobile AR devices and a back-end server. Mobile AR devices can capture real-time videos and locally decide which frame should be sent to the back-end server for logo detection. The server schedules all detection jobs to minimise the maximum latency. We implement our system on the Google Nexus 5 and a desktop with a wireless network interface. Evaluation results show that our system can detect the view change activity with an accuracy of $$95.7\% $$95.7% and successfully process 40 image processing jobs before deadline. Journal: Cyber-Physical Systems Pages: 99-115 Issue: 2 Volume: 4 Year: 2018 Month: 4 X-DOI: 10.1080/23335777.2018.1499674 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1499674 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:2:p:99-115 Template-Type: ReDIF-Article 1.0 Author-Name: G. Rigatos Author-X-Name-First: G. Author-X-Name-Last: Rigatos Author-Name: P. Siano Author-X-Name-First: P. Author-X-Name-Last: Siano Author-Name: V. Loia Author-X-Name-First: V. Author-X-Name-Last: Loia Author-Name: T. Ghosh Author-X-Name-First: T. Author-X-Name-Last: Ghosh Author-Name: A. Krawiec Author-X-Name-First: A. Author-X-Name-Last: Krawiec Title: Nonlinear optimal control for a business cycles macroeconomic model of linked economies Abstract: The article proposes nonlinear optimal control for a multi-agent Kaldor-Kalecki macroeconomic model of linked economies. The Kaldor-Kalecki model has been analysed mostly by considering closed economies in which interactions with other economies or financial institutions are overlooked. In the present article, a system of linked economies is considered in which the Kaldor-Kalecki model of each individual economy is retrofitted with a fraction of the GDP produced by the other economies. In this context a nonlinear optimal control scheme is developed for the entire financial system consisting of the interacting economies. The global stability properties of the control method are proven through Lyapunov analysis. Journal: Cyber-Physical Systems Pages: 116-136 Issue: 2 Volume: 4 Year: 2018 Month: 4 X-DOI: 10.1080/23335777.2018.1501860 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1501860 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:2:p:116-136 Template-Type: ReDIF-Article 1.0 Author-Name: Sajid Nazir Author-X-Name-First: Sajid Author-X-Name-Last: Nazir Author-Name: Hassan Hamdoun Author-X-Name-First: Hassan Author-X-Name-Last: Hamdoun Author-Name: Fabio Verdicchio Author-X-Name-First: Fabio Author-X-Name-Last: Verdicchio Author-Name: Gorry Fairhurst Author-X-Name-First: Gorry Author-X-Name-Last: Fairhurst Title: Autonomous monitoring framework for resource-constrained environments Abstract: The availability of low-cost imaging devices for embedded applications has enabled development of wireless monitoring systems capable of acquiring and transmitting both image and video data. Remote deployment of such systems is often constrained by limited power resources, thus a system must operate autonomously, balancing operational needs against available resources. This paper describes a framework for the design and implementation of an autonomous embedded remote monitoring system employing information-driven sensing to conserve energy and extend the system deployment lifetime.The results from two case studies show improvements over a conventional system and other similar systems through the use of intelligent algorithms for reliable event detection and enhanced system operational lifetime by efficient utilisation of limited resources. The results are applicable to low-power battery-operated field devices offering better resource utilisation in disaster management systems, intelligent transportation and remote monitoring. Journal: Cyber-Physical Systems Pages: 137-155 Issue: 3 Volume: 4 Year: 2018 Month: 7 X-DOI: 10.1080/23335777.2018.1499673 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1499673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:3:p:137-155 Template-Type: ReDIF-Article 1.0 Author-Name: Yi-Bing Lin Author-X-Name-First: Yi-Bing Author-X-Name-Last: Lin Author-Name: Min-Zheng Shieh Author-X-Name-First: Min-Zheng Author-X-Name-Last: Shieh Author-Name: Yun-Wei Lin Author-X-Name-First: Yun-Wei Author-X-Name-Last: Lin Author-Name: Hsin-Ya Chen Author-X-Name-First: Hsin-Ya Author-X-Name-Last: Chen Title: MapTalk: mosaicking physical objects into the cyber world Abstract: Digital map is considered as a cyber world, which maps visual representations (cyber objects) to the physical objects in the real world and allows the user to interact with these physical objects through their cyber representations. However, it typically requires significant programming effort to create a map application. This paper proposes MapTalk, a web-based visual map platform that allows the user to interact with the physical objects through their cyber representations in a visual map. We show how the administrator can add applications to the map without any programming effort. The novel idea in our approach is to utilise the IoT concept. Specifically, we implement the map as an output IoT device and all physical objects to be mosaicked in the map as input IoT devices. We show how to automatically create the device features of IoT devices when the administrator creates applications in the Map web page. We have deployed over 20 services in MapTalk including smart home, smart farm, tracking (bus, person, dog, etc), video monitoring, travel route planning, sensing of CO2, PM2.5, Internet of Things (IoT). temperature, humidity, and so on.Abbreviation: Internet of Things (IoT) Journal: Cyber-Physical Systems Pages: 156-174 Issue: 3 Volume: 4 Year: 2018 Month: 7 X-DOI: 10.1080/23335777.2018.1510856 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1510856 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:3:p:156-174 Template-Type: ReDIF-Article 1.0 Author-Name: Gang Chen Author-X-Name-First: Gang Author-X-Name-Last: Chen Author-Name: Zachary Sabato Author-X-Name-First: Zachary Author-X-Name-Last: Sabato Author-Name: Zhaodan Kong Author-X-Name-First: Zhaodan Author-X-Name-Last: Kong Title: Formal interpretation of cyber-physical system performance with temporal logic Abstract: The inherent and increasing complexity of many cyber-physical systems (CPSs) makes it challenging for human users or designers to comprehend and interpret their performance. This issue, without proper attention paid, may lead to unwanted and even catastrophic consequences, particularly with safety-critical CPSs. This paper presents a new methodology of enabling (i) a human to interrogate a CPS by inquiring with questions written in formal logic and (ii) the CPS to interpret its performance precisely in the context of the inquiry. This formal interpretation problem is first formulated as temporal logic inference problem, which, aided by the concept of robustness degree, can be converted into an optimisation problem with probably approximately correct solutions. A new Gaussian-process-based active learning algorithm is then proposed to address the potential computational budget issue arising from solving the optimisation problem. Both theoretical and empirical analyses are carried out to demonstrate the performance of the proposed algorithm. Finally, a detailed case study on automotive mechatronic design is provided to showcase the proposed formal interpretation methodology. Journal: Cyber-Physical Systems Pages: 175-203 Issue: 3 Volume: 4 Year: 2018 Month: 7 X-DOI: 10.1080/23335777.2018.1510857 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1510857 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:3:p:175-203 Template-Type: ReDIF-Article 1.0 Author-Name: Pravin Zode Author-X-Name-First: Pravin Author-X-Name-Last: Zode Author-Name: Raghavendra Deshmukh Author-X-Name-First: Raghavendra Author-X-Name-Last: Deshmukh Title: Side channel attack resistant architecture for elliptic curve cryptosystem Abstract: Significant efforts are required for protection of cryptographic implementation in hostile environment, adversary injects fault in the cryptosystem by varying supply voltage, clock glitch and observe side channel information and tamper to break the cryptographic implementations. In this paper, side channel attack resistant architecture for elliptic curve cryptosystem using pseudo power noise generator, Xilinx IPs System Monitor and Digital Clock Management is proposed. These IPs are customisable and take less area on die size, provides sufficient security. The proposed architecture is robust and implemented without any major design efforts. The architecture is implemented on Xilinx ML605 embedded development board and the result shows that it take very less area as it uses vendor specific customisable IPs. Journal: Cyber-Physical Systems Pages: 205-215 Issue: 4 Volume: 4 Year: 2018 Month: 10 X-DOI: 10.1080/23335777.2018.1515163 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1515163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:4:p:205-215 Template-Type: ReDIF-Article 1.0 Author-Name: G. Rigatos Author-X-Name-First: G. Author-X-Name-Last: Rigatos Author-Name: P. Siano Author-X-Name-First: P. Author-X-Name-Last: Siano Title: Differential flatness and boundary control for bandwidth allocation in Internet routes Abstract: The problem of feedback control of bandwidth allocation for Internet links is analysed in this article. It is shown that the procedure for numerical solution of a fluid flow partial differential equation (PDE) which describes the bandwidth allocation on a link results into a set of ordinary differential equations (ODEs) and into an associated state-space equations model. For the local subsystems, into which the flow PDE is decomposed, it becomes possible to apply boundary-based feedback control. The solution of the control problem proceeds by showing that the state-space model of the flow PDE stands for a differentially flat system. Next, for each subsystem which is related to an ODE, a virtual control input is computed, which can invert the subsystem’s dynamics and can eliminate the subsystem’s tracking error. From the last row of the state-space description, the control input (boundary condition) that is actually applied to the data-flow PDE is found. This control input contains recursively all virtual control inputs which were computed for the individual ODE subsystems associated with the previous rows of the state-space equation. Thus, by tracing the rows of the state-space model backwards, at each iteration of the control algorithm, one can finally obtain the control input that should be applied to the data flow PDE of the communication network so as to assure that all its state variables will converge to the desirable set points. Journal: Cyber-Physical Systems Pages: 216-231 Issue: 4 Volume: 4 Year: 2018 Month: 10 X-DOI: 10.1080/23335777.2018.1521872 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1521872 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:4:p:216-231 Template-Type: ReDIF-Article 1.0 Author-Name: Zach DeSmit Author-X-Name-First: Zach Author-X-Name-Last: DeSmit Author-Name: Aditya U. Kulkarni Author-X-Name-First: Aditya U. Author-X-Name-Last: Kulkarni Author-Name: Christian Wernz Author-X-Name-First: Christian Author-X-Name-Last: Wernz Title: Enhancing cyber-physical security in manufacturing through game-theoretic analysis Abstract: Modern manufacturing systems utilise cyber-physical systems that are interconnected through an Internet of Things (IoT) network. An IoT infrastructure enables cyber-physical systems to communicate with each other and coordinate the manufacturing process autonomously with minimal human assistance. A significant challenge for cyber-physical systems is cybersecurity. Adversaries can exploit weaknesses in the IoT security infrastructure to gain remote access to the system and modify or damage manufacturing processes and/or products. Due to the autonomous nature of cyber-physical systems, cyberattacks can go unnoticed by the users for a long time, further compounding the problem. Attacks on cyber-physical systems are on the rise, and manufacturers need to address this problem. In this article, we discuss how game-theoretic thinking and modelling can help to identify a manufacturer’s cyber vulnerabilities and enhance its security. We consider various attack and defence scenarios and analyse each through the corresponding game-theoretic model. Our approach and findings can be used to improve the effectiveness and efficiency of security strategies for cyber-physical manufacturing systems. Journal: Cyber-Physical Systems Pages: 232-259 Issue: 4 Volume: 4 Year: 2018 Month: 10 X-DOI: 10.1080/23335777.2018.1537302 File-URL: http://hdl.handle.net/10.1080/23335777.2018.1537302 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:4:y:2018:i:4:p:232-259 Template-Type: ReDIF-Article 1.0 Author-Name: Moushumi Barman Author-X-Name-First: Moushumi Author-X-Name-Last: Barman Author-Name: Hridoy Jyoti Mahanta Author-X-Name-First: Hridoy Jyoti Author-X-Name-Last: Mahanta Title: A randomised scheme for secured modular exponentiation against power analysis attacks Abstract: This paper presents an approach to compute secured modular exponentiation to mitigate power analysis attacks. Two processes have been designed based on ‘multiply-always’ binary method, which injects dummy multiplications so that the original multiplications can remain intact. The two processes are being invoked based on a random variable, which generated either 0 or 1. With these randomised modular exponentiation, the proposed approach can resist simple and differential power analysis attacks to a large extent. The proposed approach has been implemented using conventional ‘squaring-multiplication’ and ‘Montgomery-Ladder’ methods. Further, the work has also been extended to CRT-RSA, which is widely used for fast computation. The proposed method has been implemented for different key sizes of 1024-bit, 1536-bit and 2048-bit RSA & CRT-RSA. The analysis and results show that with a complexity of $$O(n)$$O(n), the proposed approach can resist some of the standard DPA attacks on modular exponentiation. Journal: Cyber-Physical Systems Pages: 209-230 Issue: 4 Volume: 5 Year: 2019 Month: 10 X-DOI: 10.1080/23335777.2019.1637944 File-URL: http://hdl.handle.net/10.1080/23335777.2019.1637944 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:5:y:2019:i:4:p:209-230 Template-Type: ReDIF-Article 1.0 Author-Name: G. Rigatos Author-X-Name-First: G. Author-X-Name-Last: Rigatos Author-Name: N. Zervos Author-X-Name-First: N. Author-X-Name-Last: Zervos Author-Name: P. Siano Author-X-Name-First: P. Author-X-Name-Last: Siano Author-Name: M. Abbaszadeh Author-X-Name-First: M. Author-X-Name-Last: Abbaszadeh Author-Name: P. Wira Author-X-Name-First: P. Author-X-Name-Last: Wira Author-Name: B. Onose Author-X-Name-First: B. Author-X-Name-Last: Onose Title: Nonlinear optimal control for DC industrial microgrids Abstract: DC industrial microgrids can assure uninterrupted and free-of-perturbations power supply to industrial units. Besides the solution of the related optimal control problem can result in minimisation of electric power consumption by such units. In this article, the problem of nonlinear optimal (H-infinity) control for industrial microgrids is treated. The dynamic model of an indicative microgrid that comprises photovoltaic units, batteries and supercapacitors is considered. This model undergoes approximate linearisation around a temporary operating point that is recomputed at each time-step of the control method. The linearisation relies on Taylor series expansion and on the computation of the associated Jacobian matrices. For the linearised state-space model of the system, a stabilising optimal (H-infinity) feedback controller is designed. This controller stands for the solution to the nonlinear optimal control problem under model uncertainty and external perturbations. To compute the controller’s feedback gains an algebraic Riccati equation is repetitively solved at each iteration of the control algorithm. The stability properties of the control method are proven through Lyapunov analysis. Finally, to implement state estimation-based control without the need to measure the entire state vector of the DC microgrid the H-infinity Kalman Filter is used as a robust state estimator. Journal: Cyber-Physical Systems Pages: 231-253 Issue: 4 Volume: 5 Year: 2019 Month: 10 X-DOI: 10.1080/23335777.2019.1640796 File-URL: http://hdl.handle.net/10.1080/23335777.2019.1640796 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:5:y:2019:i:4:p:231-253 Template-Type: ReDIF-Article 1.0 Author-Name: Magdi S. Mahmoud Author-X-Name-First: Magdi S. Author-X-Name-Last: Mahmoud Author-Name: Mojeed Oyedeji Author-X-Name-First: Mojeed Author-X-Name-Last: Oyedeji Title: Consensus in multi-agent systems over time-varying networks Abstract: Consensus control in multi-agent systems is becoming increasingly popular among researchers due to its applicability in analysing and designing coordination behaviours among agents in multi-agent framework. This paper provides an extensive overview on consensus control in multi-agent systems from the network perspective. This survey provides● A detailed summary of each model which have been investigated by earlier researchers in consensus control.● An overview of different forms of consensus definitions as described in earlier investigations.● An overview of recent results in consensus-related problems involving network phenomenon such as time delay, actuator failures, switching and random networks.● Some suggestions for future work towards designing better consensus protocols addressing more practical problems in autonomous multi-agent systems. Journal: Cyber-Physical Systems Pages: 117-145 Issue: 3 Volume: 6 Year: 2020 Month: 07 X-DOI: 10.1080/23335777.2020.1716270 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1716270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:3:p:117-145 Template-Type: ReDIF-Article 1.0 Author-Name: Xiaona Song Author-X-Name-First: Xiaona Author-X-Name-Last: Song Author-Name: Zhibo Wang Author-X-Name-First: Zhibo Author-X-Name-Last: Wang Author-Name: Mi Wang Author-X-Name-First: Mi Author-X-Name-Last: Wang Author-Name: Shuai Song Author-X-Name-First: Shuai Author-X-Name-Last: Song Title: Reliable exponential stabilisation for fractional-order semilinear parabolic distributed parameter systems: an LMI approach Abstract: This paper investigates the problem of exponential stabilisation for fractional-order semilinear parabolic distributed parameter systems with actuator faults, and a reliable state feedback controller is proposed. First, the considered nonlinear fractional-order distributed parameter systems are reconstructed by Takagi-Sugeno (T-S) fuzzy partial differential equation (PDE) model, where a finite number of actuators are active only at some specified points of the spatial domain. Then, based on the obtained fractional-order T-S fuzzy PDE model, a fractional-order Lyapunov technique is used to analyse the closed-loop exponential stability. By using the vector-valued Wirtinger’s inequality, a reliable state feedback controller that can guarantee locally exponential stabilisation of the fractional-order semilinear PDE systems is presented in terms of linear matrix inequalities. Finally, a numerical simulation is provided to demonstrate the effectiveness of the proposed method. Journal: Cyber-Physical Systems Pages: 146-164 Issue: 3 Volume: 6 Year: 2020 Month: 07 X-DOI: 10.1080/23335777.2020.1738556 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1738556 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:3:p:146-164 Template-Type: ReDIF-Article 1.0 Author-Name: Hridoy Jyoti Mahanta Author-X-Name-First: Hridoy Jyoti Author-X-Name-Last: Mahanta Author-Name: Abhilash Chakraborty Author-X-Name-First: Abhilash Author-X-Name-Last: Chakraborty Author-Name: Ajoy Kumar Khan Author-X-Name-First: Ajoy Kumar Author-X-Name-Last: Khan Title: Design and verification of improved CMERE against power analysis attacks Abstract: The CMERE algorithm was designed to resist DPA attacks on modular exponentiation. It was implemented and tested at the algorithmic level for different key sizes of the RSA cryptosystems. The strength of CMERE lied on the facts that it could be implemented both on left-to-right and right-to-left binary methods for modular exponentiation without any changes in the original algorithm. Also, the execution of modular exponentiation was completely bit independent making it a very strong countermeasure against simple and differential power analysis attacks. In this paper, we have verified the CMERE algorithm at hardware level using VHDL. During formal verification with VHDL on FPGA, the algorithm was modified for practical implementation. However, the overall strength of the improved CMERE algorithm remains the same as the original algorithm. Journal: Cyber-Physical Systems Pages: 165-179 Issue: 3 Volume: 6 Year: 2020 Month: 07 X-DOI: 10.1080/23335777.2020.1769735 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1769735 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:3:p:165-179 Template-Type: ReDIF-Article 1.0 Author-Name: G. Rigatos Author-X-Name-First: G. Author-X-Name-Last: Rigatos Author-Name: K. Busawon Author-X-Name-First: K. Author-X-Name-Last: Busawon Author-Name: M. Abbaszadeh Author-X-Name-First: M. Author-X-Name-Last: Abbaszadeh Author-Name: P. Wira Author-X-Name-First: P. Author-X-Name-Last: Wira Title: Non-linear optimal control for four-wheel omnidirectional mobile robots Abstract: The article proposes a non-linear optimal control approach for four-wheel omnidirectional mobile robots. The method has been successfully tested so-far on the control problem of several types of autonomous ground vehicles and the present article shows that it can also provide the only optimal solution to the control problem of four-wheel omnidirectional robotic vehicles. To implement this control scheme, the state-space model of the robotic vehicle undergoes first approximate linearisation around a temporary operating point, through first-order Taylor series expansion and through the computation of the associated Jacobian matrices. To select the feedback gains of the H-infinity controller an algebraic Riccati equation is repetitively solved at each time-step of the control method. The global stability properties of the control loop are proven through Lyapunov analysis. Finally, to implement state estimation-based feedback control, the H-infinity Kalman Filter is used as a robust state estimator. Journal: Cyber-Physical Systems Pages: 181-206 Issue: 4 Volume: 6 Year: 2020 Month: 10 X-DOI: 10.1080/23335777.2020.1716269 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1716269 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:4:p:181-206 Template-Type: ReDIF-Article 1.0 Author-Name: Wenhui Wu Author-X-Name-First: Wenhui Author-X-Name-Last: Wu Author-Name: Xin Jin Author-X-Name-First: Xin Author-X-Name-Last: Jin Author-Name: Yang Tang Author-X-Name-First: Yang Author-X-Name-Last: Tang Title: Vision-based trajectory tracking control of quadrotors using super twisting sliding mode control Abstract: A trajectory-tracking problem for a vision-based quadrotor control system is investigated in this paper. A super twisting sliding mode (STSM) controller is proposed for finite-time trajectory tracking control. With the help of the homogeneous technique, the closed-loop system is proved to be finite-time stable. In addition, due to the introduction of super twisting mechanism, the controller can restrain chattering effect of sliding mode control. On the other hand, a pose estimation through data fusion is proposed to localise the quadrotor. A Kalman filter (KF) is utilised to fuse the estimated pose from semi-direct monocular visual odometry (SVO) with data from inertial measurement unit (IMU). A number of simulations are carried out on MATLAB and physical engine simulator Gazebo. The results show that the proposed system controller has better performances in terms of robustness and anti-disturbance than the proportional–integral–derivative (PID) controller and the first order sliding mode controller. Journal: Cyber-Physical Systems Pages: 207-230 Issue: 4 Volume: 6 Year: 2020 Month: 10 X-DOI: 10.1080/23335777.2020.1727960 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1727960 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:4:p:207-230 Template-Type: ReDIF-Article 1.0 Author-Name: Siqing Chen Author-X-Name-First: Siqing Author-X-Name-Last: Chen Author-Name: Xin Jin Author-X-Name-First: Xin Author-X-Name-Last: Jin Author-Name: Wenle Zhang Author-X-Name-First: Wenle Author-X-Name-Last: Zhang Author-Name: Yang Tang Author-X-Name-First: Yang Author-X-Name-Last: Tang Title: Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control Abstract: Vision-based formation control offers an alternate solution for unmanned aerial vehicles (UAVs) to work together in the external position system denied environment. In this paper, we present a vision-based formation control strategy with the advantages of high tracking performance and low consumption of communication resources. A vision-based multi-robot localisation methods is applied to get precise position information, and the extended Kalman filter (EKF) is used to fuse measurement data from different sensors. The integral sliding mode controller (ISMC) is utilised to ensure the fast convergence and robustness to the desired formation, and the event-triggered communication scheme is employed to reduce redundant transmission of state information used in the formation controller. The simulation results in Gazebo with a team of three UAVs are given to illustrate the effectness of the proposed control strategy. Journal: Cyber-Physical Systems Pages: 231-251 Issue: 4 Volume: 6 Year: 2020 Month: 10 X-DOI: 10.1080/23335777.2020.1750054 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1750054 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:6:y:2020:i:4:p:231-251 Template-Type: ReDIF-Article 1.0 Author-Name: Yanbo Zhang Author-X-Name-First: Yanbo Author-X-Name-Last: Zhang Author-Name: Zidong Chai Author-X-Name-First: Zidong Author-X-Name-Last: Chai Author-Name: Xiaobo Liu Author-X-Name-First: Xiaobo Author-X-Name-Last: Liu Author-Name: Ruonan Xing Author-X-Name-First: Ruonan Author-X-Name-Last: Xing Author-Name: Mengti Zhao Author-X-Name-First: Mengti Author-X-Name-Last: Zhao Author-Name: Danhua Li Author-X-Name-First: Danhua Author-X-Name-Last: Li Author-Name: Xinyu Zhang Author-X-Name-First: Xinyu Author-X-Name-Last: Zhang Author-Name: Yu Hao Author-X-Name-First: Yu Author-X-Name-Last: Hao Author-Name: Aliaksei Vasilyeu Author-X-Name-First: Aliaksei Author-X-Name-Last: Vasilyeu Title: Public goods game with the moral dual process theory Abstract: It is the objective law of development of nature that natural selection and survival of the fittest are incorporated. As the reason that cooperation is not a predeterminate process or results, it is interesting to study the emergent phenomena of cooperation. Although providing a punishment option to community members of the public goods game (PGG) has been shown to effectively promote cooperation . In real life, people will sometimes help others even at the expense of their own costs. Reward behaviour is an important phenomenon of social, which emerges as a result of the interactions among individuals. In this article, we carry out the representative expansion for both positive and negative reciprocit ies to the PGG, which is based on the dual-process theory of morality. We research the evolution of group cooperation about PGG under the condition that punishment and reward exist. This result indicates that punishment and reward are significant in the emergence and stabilisation of cooperation. Our experimental results also provide valuable information about strategies for theories of evolutionary games and social dynamics. Journal: Cyber-Physical Systems Pages: 1-10 Issue: 1 Volume: 7 Year: 2021 Month: 01 X-DOI: 10.1080/23335777.2020.1769736 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1769736 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:1:p:1-10 Template-Type: ReDIF-Article 1.0 Author-Name: Sharath Yaji Author-X-Name-First: Sharath Author-X-Name-Last: Yaji Author-Name: Neelima Bayyapu Author-X-Name-First: Neelima Author-X-Name-Last: Bayyapu Title: Result attack: a privacy breaching attack for personal data through K-means algorithm Abstract: Protecting data privacy concerns the most significant challenge of the present era. This paper is an attempt to demonstrate how machine learning can be used by an attacker to compromise data privacy. To demonstrate, we have chosen an attack on handwritten signatures. The attacker utilizes available signatures for training and appends malicious signatures to be used in the testing process until he gets the desired result. The attacker manipulates the achieved result to perform the malicious attack. We propose, result attack to highlight the need for ensuring the secrecy of the genuine signature. An illustration is performed by applying the K-means algorithm to the MNIST dataset. Differential Privacy (DP) is adopted for defense discussion. The illustration of DP is produced by aggregating red or white noise to the MNIST dataset. Observation shows, the aggregation of noise to personal data successfully delivers defense against the result attack. We get the area under the receiver operating characteristic curve for the original dataset as 0.878719, original dataset vs aggregated red noise as 0.4999901, and original dataset vs white noise as 0.4448475. This concludes for the defense model, aggregating white noise is better than red noise, i.e. white noise aggregation is 11% better than red noise. Journal: Cyber-Physical Systems Pages: 11-40 Issue: 1 Volume: 7 Year: 2021 Month: 01 X-DOI: 10.1080/23335777.2020.1811380 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:1:p:11-40 Template-Type: ReDIF-Article 1.0 Author-Name: Erfan Shahradfar Author-X-Name-First: Erfan Author-X-Name-Last: Shahradfar Author-Name: Ahmad Fakharian Author-X-Name-First: Ahmad Author-X-Name-Last: Fakharian Title: Optimal controller design for DC microgrid based on state-dependent Riccati Equation (SDRE) approach Abstract: In the present paper, an optimal control method based on State-Dependent Riccati Equation (SDRE) is used to design a controller for DC microgrid system. In the proposed method, optimal control law is proposed for stabilisation and tracking of online reference paths using pseudo-linearisation and by preserving all the nonlinear characteristics of the system. The proposed method not only traces reference paths, but also is able to minimise control effort and energy consumption. Simulation results indicate efficient performance of the proposed method with regard to tracking reference paths despite the changes in operating point, external load disturbance and parametric uncertainty in comparison with linear quadratic regulators. Journal: Cyber-Physical Systems Pages: 41-72 Issue: 1 Volume: 7 Year: 2021 Month: 01 X-DOI: 10.1080/23335777.2020.1811381 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811381 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:1:p:41-72 Template-Type: ReDIF-Article 1.0 Author-Name: Moolchand Sharma Author-X-Name-First: Moolchand Author-X-Name-Last: Sharma Author-Name: Vikas Choudhary Author-X-Name-First: Vikas Author-X-Name-Last: Choudhary Author-Name: R. S. Bhatia Author-X-Name-First: R. S. Author-X-Name-Last: Bhatia Author-Name: Sahil Malik Author-X-Name-First: Sahil Author-X-Name-Last: Malik Author-Name: Anshuman Raina Author-X-Name-First: Anshuman Author-X-Name-Last: Raina Author-Name: Harshit Khandelwal Author-X-Name-First: Harshit Author-X-Name-Last: Khandelwal Title: Leveraging the power of quantum computing for breaking RSA encryption Abstract: Encryption is the process of securing confidential data that bars a third party’s access to the information.RSA encryption utilises the property of complexity classes wherein the problem of prime integer factorization lies inside the Non-Polynomial time (NP-Hard) class, which makes it impervious to classical computers. Since it is so hard to break even for a computer, it becomes important to do encryption for all the secure transactions. Although it lies outside the capabilities of traditional computing, the recent developments in the field of quantum computing can be utilised to break RSA Encryption. The approach involves mapping of qubits used in a quantum machine to a constraint satisfaction problem (CSP) and then using them to check for factors. This consists of the use of a Multiplicative Boolean circuit in which the qubits utilised by the machine replaces the variables. These Qubits are then mapped as per the gates involved, and the factorization problem is thus transformed into a CSP problem, through which, the factors can be easily found. Once known, these factors can be used to calculate the public and private keys effectively breaking the encryption security. We provide a novel approach to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication. Journal: Cyber-Physical Systems Pages: 73-92 Issue: 2 Volume: 7 Year: 2021 Month: 04 X-DOI: 10.1080/23335777.2020.1811384 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811384 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:2:p:73-92 Template-Type: ReDIF-Article 1.0 Author-Name: M. J. Mahmoodabadi Author-X-Name-First: M. J. Author-X-Name-Last: Mahmoodabadi Title: Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems Abstract: In this paper, an online optimal adaptive robust fuzzy controller based on the Moving Least Squares (MLS) and Team Game Algorithm (TGA) is introduced to control uncertain chaotic nonlinear systems. At first, a robust supervisory stabiliser and a fuzzy adaptive PID controller are designed and combined to handle a Duffing-Holmes chaotic oscillator. Next, the TGA is utilised to optimise the parameters of the designed fuzzy adaptive robust controller for different values of system disturbances. Then, to adapt the optimum design parameters of the controller with the uncertain values of the external disturbances, the MLS approximation is implemented. In order to evaluate the performance of the proposed technique, it is applied on a Duffing-Holmes chaotic nonlinear oscillator with different initial conditions. The results and the analysis prove the efficiency of the proposed controller with regard to uncertain systems’ challenging external disturbances that impair the stability, accuracy and optimality of the system. Journal: Cyber-Physical Systems Pages: 93-113 Issue: 2 Volume: 7 Year: 2021 Month: 04 X-DOI: 10.1080/23335777.2020.1811385 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811385 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:2:p:93-113 Template-Type: ReDIF-Article 1.0 Author-Name: Bo Zhang Author-X-Name-First: Bo Author-X-Name-Last: Zhang Author-Name: Xiaoyu Su Author-X-Name-First: Xiaoyu Author-X-Name-Last: Su Title: State estimation and stabilisation of nonlinear networked control systems with mixed time-delay Abstract: In this paper, the problems of time-delay, packet loss and quantisation for network control with global Lipschitz nonlinearity are investigated. The packet losses between the forward and backward channels are considered, and two independent Bernoulli distributions are modelled respectively. An appropriate compensation strategy is proposed to reduce the buffeting and response time of the system. A controller based on differential proportional observer is proposed. The information of estimation errors is used to optimise state estimations. Finally, a simulation example illustrates the feasibility of the method, and the comparisons with existing discrete time-delay system and distributed time-delay system prove the superiority of the method. Journal: Cyber-Physical Systems Pages: 114-132 Issue: 2 Volume: 7 Year: 2021 Month: 04 X-DOI: 10.1080/23335777.2020.1811382 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811382 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:2:p:114-132 Template-Type: ReDIF-Article 1.0 Author-Name: Yanwen Meng Author-X-Name-First: Yanwen Author-X-Name-Last: Meng Author-Name: Qiyu Sun Author-X-Name-First: Qiyu Author-X-Name-Last: Sun Author-Name: Chongzhen Zhang Author-X-Name-First: Chongzhen Author-X-Name-Last: Zhang Author-Name: Yang Tang Author-X-Name-First: Yang Author-X-Name-Last: Tang Title: Unsupervised learning of depth and ego-motion with absolutely global scale recovery from visual and inertial data sequences Abstract: In this paper, we propose an unsupervised learning method for jointly estimating monocular depth and ego-motion, which is capable to recover the absolute scale of global camera trajectory. In order to solve the general problems of scale drift and scale ambiguity of monocular camera, we fuse geometric movement data from inertial measurement unit (IMU), and use Bi-directional Long Short-Term Memory (BiLSTM) to extract temporal features. Besides, we add a lightweight and efficient attention mechanism, Convolutional Block Attention Module (CBAM), to Convolutional Neural Networks (CNNs) to complete the extraction of image features. Considering the scenes with severe illumination changes, ambiguous structures, moving objects and occlusions, especially scenes with progressively-variant textures, the geometric features can provide adaptive estimation results in the case of the degeneration of visual features. Experiments on the KITTI driving dataset reveal that our scheme achieves promising results in the estimation of camera pose and depth. Moreover, the absolute scale recovery for the global camera trajectory is effective. Journal: Cyber-Physical Systems Pages: 133-158 Issue: 3 Volume: 7 Year: 2021 Month: 07 X-DOI: 10.1080/23335777.2020.1811386 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811386 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:3:p:133-158 Template-Type: ReDIF-Article 1.0 Author-Name: Rajorshi Biswas Author-X-Name-First: Rajorshi Author-X-Name-Last: Biswas Author-Name: Jie Wu Author-X-Name-First: Jie Author-X-Name-Last: Wu Author-Name: Xiaojiang Du Author-X-Name-First: Xiaojiang Author-X-Name-Last: Du Author-Name: Yaling Yang Author-X-Name-First: Yaling Author-X-Name-Last: Yang Title: Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks Abstract: Cognitive radio networks (CRNs), which offer novel network architecture for utilising spectrums, have attracted significant attention in recent years. CRN users use spectrums opportunistically, which means they sense a channel, and if it is free, they start transmitting in that channel. In cooperative spectrum sensing, a secondary user (SU) decides about the presence of the primary user (PU) based on information from other SUs. Malicious SUs (MSUs) send false sensing information to other SUs so that they make wrong decisions about the spectrum status. As a result, an SU may transmit during the presence of the PU or may keep starving for the spectrum. In this paper, we propose a reputation-based mechanism which can minimise the effects of MSUs on decision making in cooperative spectrum sensing. Some of the SUs are selected as distributed fusion centres (DFCs), that are responsible for making decisions about the presence of PU and informing the reporting SUs. A DFC uses weighted majority voting among the reporting SUs, where weights are normalised reputation. The DFC updates reputations of SUs based on confidence of an election. If the majority wins by a significant margin, the confidence of the election is high. In this case, SUs that belong to the majority gain high reputations. We conduct extensive simulations to validate our proposed model. Journal: Cyber-Physical Systems Pages: 159-178 Issue: 3 Volume: 7 Year: 2021 Month: 07 X-DOI: 10.1080/23335777.2020.1811387 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811387 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:3:p:159-178 Template-Type: ReDIF-Article 1.0 Author-Name: Dongxiao Hu Author-X-Name-First: Dongxiao Author-X-Name-Last: Hu Author-Name: Xiaona Song Author-X-Name-First: Xiaona Author-X-Name-Last: Song Author-Name: Mi Wang Author-X-Name-First: Mi Author-X-Name-Last: Wang Author-Name: Junwei Lu Author-X-Name-First: Junwei Author-X-Name-Last: Lu Title: Exponential stabilisation for nonlinear PDE systems via sampled-data static output feedback control Abstract: This paper focuses on the problem of exponential stabilisation for nonlinear partial differential equation (PDE) systems by designing sampled-data static output feedback controller. First, the nonlinear PDE systems are reconstructed by Takagi-Sugeno (T-S) fuzzy model. Subsequently, the closed-loop systems are obtained by introducing sampled-data static output feedback fuzzy controller. Then, stability conditions of the closed-loop system are obtained based on Lyapunov function approach, which can guarantee that the considered systems are exponential stabilisation and satisfy dissipative performance. Finally, the effectiveness of the developed method is demonstrated by a simulation study. Journal: Cyber-Physical Systems Pages: 179-196 Issue: 3 Volume: 7 Year: 2021 Month: 07 X-DOI: 10.1080/23335777.2020.1837249 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1837249 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:3:p:179-196 Template-Type: ReDIF-Article 1.0 Author-Name: M. Abate Author-X-Name-First: M. Author-X-Name-Last: Abate Author-Name: W. Stuckey Author-X-Name-First: W. Author-X-Name-Last: Stuckey Author-Name: L. Lerner Author-X-Name-First: L. Author-X-Name-Last: Lerner Author-Name: E. Feron Author-X-Name-First: E. Author-X-Name-Last: Feron Author-Name: S. Coogan Author-X-Name-First: S. Author-X-Name-Last: Coogan Title: Memory-loss resilient controller design for temporal logic constraints Abstract: This paper studies the problem of controlling finite nondeterministic transition systems to satisfy constraints given as linear temporal logic properties. A controller architecture is proposed that maps finite fragments of the state trajectory history to control inputs. This approach avoids the standard controller construction that employs an onboard automaton which is fragile to memory loss or errors. In contrast, the proposed architecture requires storing only a finite sequence of previous system states in memory and is therefore resilient to memory loss. In particular, the system will operate unaltered after such a memory-loss event once the system recollects this finite sequence of system states. A generalised algorithm is outlined for controller synthesis in this manner. Additionally, we demonstrate the construction and implementation of such a memory-loss resilient controller through an experimental demonstration on a differential-drive robot that experiences memory-loss events. Journal: Cyber-Physical Systems Pages: 221-242 Issue: 4 Volume: 7 Year: 2021 Month: 10 X-DOI: 10.1080/23335777.2020.1837248 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1837248 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:4:p:221-242 Template-Type: ReDIF-Article 1.0 Author-Name: Pankaj Kumar Keserwani Author-X-Name-First: Pankaj Kumar Author-X-Name-Last: Keserwani Author-Name: Mahesh Chandra Govil Author-X-Name-First: Mahesh Chandra Author-X-Name-Last: Govil Author-Name: Emmanuel S. Pilli Author-X-Name-First: Emmanuel Author-X-Name-Last: S. Pilli Title: An Optimal Intrusion Detection System using GWO-CSA-DSAE Model Abstract: In the high demand of the cloud computing environment, intrusion detection in a cloud network playing a big role in maintaining the faith of the client(s). Due to the increasing complexity of the cloud environment, the existing approaches which use the conventional neural networks are not able to utilise the relevant information from the network traffic, which leads to a low detection rate. This reduces the stability of the existing approaches in this changing environment. In this paper, an anomaly-based cloud intrusion detection system (IDS) is proposed for finding the intrusions in a cloud network. The proposed system uses a hybrid metaheuristic algorithm for feature selection and a deep learning approach for classification. For feature selection, grey wolf optimisation (GWO) is hybrid with a crow search algorithm (CSA), which extracts relevant features from the cloud network connection to be processed more effectively in the deep learning classifier section. A deep sparse auto-encoder (DSAE) is employed for the classification purpose. For the performance comparison, the considered metrics are accuracy, precision, recall or detection rate (DR), and F1 Score. Three publically well-known available datasets namely NSL-KDD, UNSW-NB15, and CICIDS 2017 have been considered for analysing the performance of the proposed GWO-CSA-DSAE model for intrusion detection in a cloud network. The experimental results of the proposed model have been compared with the results of existing recent approaches in the case of binary classification and multi-class classification. It is found that GWO-CSA-DSAE model is better for intrusion detection, which is the proposed model for intrusion detection in a cloud network. Journal: Cyber-Physical Systems Pages: 197-220 Issue: 4 Volume: 7 Year: 2021 Month: 10 X-DOI: 10.1080/23335777.2020.1811383 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1811383 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:7:y:2021:i:4:p:197-220 Template-Type: ReDIF-Article 1.0 Author-Name: Rahul Johari Author-X-Name-First: Rahul Author-X-Name-Last: Johari Author-Name: Arvinder Kaur Author-X-Name-First: Arvinder Author-X-Name-Last: Kaur Author-Name: Mohammad Hashim Author-X-Name-First: Mohammad Author-X-Name-Last: Hashim Author-Name: Prateek Kumar Rai Author-X-Name-First: Prateek Kumar Author-X-Name-Last: Rai Author-Name: Kanika Gupta Author-X-Name-First: Kanika Author-X-Name-Last: Gupta Title: SEVA: Secure E-Voting Application in Cyber Physical System Abstract: Election is the right of every citizen. The exercise of this right through the election is a very expensive mechanism. The people of the constituency, where the elections are to be held, are usually given a day off, so that they can vote. But still many people do not vote. To overcome this problem, an application: ”SEVA: Secure E-Voting Application” in Cyber Physical System is hereby proposed which gives the voters the ability to cast their votes over the web from any remote location of the world. The proposed application deployed on the cloud has been designed and developed using cutting edge technologies like Azure Service Fabric using Microservice architecture. The application is deployed on the Five-Node cluster using Server Fabric Local Cluster for demonstration. Journal: Cyber-Physical Systems Pages: 1-31 Issue: 1 Volume: 8 Year: 2022 Month: 01 X-DOI: 10.1080/23335777.2020.1837250 File-URL: http://hdl.handle.net/10.1080/23335777.2020.1837250 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:1:p:1-31 Template-Type: ReDIF-Article 1.0 Author-Name: Suresh Chavhan Author-X-Name-First: Suresh Author-X-Name-Last: Chavhan Author-Name: Joel J. P. C. Rodrigues Author-X-Name-First: Joel J. P. C. Author-X-Name-Last: Rodrigues Author-Name: Ashish Khanna Author-X-Name-First: Ashish Author-X-Name-Last: Khanna Title: Computational intelligence paradigm for job shop scheduling and routing in an uncertain environment Abstract: Computational Intelligence (CI) is a more efficient paradigm for solving real-world problems in uncertain conditions. The traditional CI approaches are not capable to provide the complete and sufficient solutions for problems. Therefore, new techniques are necessary to efficiently solve these issues seriously. New techniques, such as Emergent Intelligence (EI), Multi-Agent System (MAS), etc., provide robust, generic, flexible, and self-organised to solve complex real-world problems. In this paper, we discuss Emergent Intelligence (EI) and its uniqueness in solving problems in an uncertain environment. We also discuss EI, Swarm Intelligence (SI) and MultiAgent System (MAS)-based problem-solving in an uncertain environment and compared their performance. We have considered two different problems: job shop scheduling using EI and MAS and route establishment for routing using MAS, SI and EI in an uncertain environment. Each problem is categorically analysed and solved step by step using MAS, SI and EI in a dynamic environment. We measure the performance of these three methods by varying the number of agents, tasks and time. Performance measures are compared and shown to demonstrate the importance of EI over MAS and SI for solving problems in an uncertain environment. Journal: Cyber-Physical Systems Pages: 45-66 Issue: 1 Volume: 8 Year: 2022 Month: 01 X-DOI: 10.1080/23335777.2021.1879275 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1879275 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:1:p:45-66 Template-Type: ReDIF-Article 1.0 Author-Name: Bin Wang Author-X-Name-First: Bin Author-X-Name-Last: Wang Author-Name: Zhen Wang Author-X-Name-First: Zhen Author-X-Name-Last: Wang Author-Name: Dou Zhao Author-X-Name-First: Dou Author-X-Name-Last: Zhao Author-Name: Xuhai Wang Author-X-Name-First: Xuhai Author-X-Name-Last: Wang Title: A rail detection algorithm for accurate recognition of train fuzzy video Abstract: The research follows the mainstream physics and network system architecture. Aiming at the problem of poor data processing ability and poor robustness of traditional trajectory detection algorithms, a trajectory detection method that can be accurately extracted from the fuzzy video of a locomotive is proposed. Firstly, in order to ensure the accuracy of rail detection of trains in complex environments and improve the safety of driverless driving, the video image captured by on-board camera is stored as RGB video frame set, and then processed as single-channel greyscale image carrier set; Secondly, after the initial colour and brightness treatment, the redundant and useless noise features in the greyscale image carrier set still exist. After secondary Gaussian filtering and de-noising, canny operator is used to detect the track edge details of interest; Finally, the rail area is taken as the interested target for Hough line detection, the background subtraction method of adaptive mixed Gaussian background modelling is introduced, the structure element function and the morphologyEx theory of morphological transformation function are introduced, and the left and right tracks are fitted after the calculation and judgement of pixel coordinates. Algorithm for visual tracking experiments show that, rail detection algorithm has already meet need to detect rails in low-quality videos recorded by the on-board cameras of different models of trains at different speed. It not only can process large quantity of data from the on-board camera videos in real time, but also can accurately detect the target rails adaptively where rail conditions are complex with obstructive objects, which shows that this algorithm has very robust performance. Journal: Cyber-Physical Systems Pages: 67-84 Issue: 1 Volume: 8 Year: 2022 Month: 01 X-DOI: 10.1080/23335777.2021.1879277 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1879277 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:1:p:67-84 Template-Type: ReDIF-Article 1.0 Author-Name: Asim Kumar Mahadani Author-X-Name-First: Asim Kumar Author-X-Name-Last: Mahadani Author-Name: Shashank Awasthi Author-X-Name-First: Shashank Author-X-Name-Last: Awasthi Author-Name: Goutam Sanyal Author-X-Name-First: Goutam Author-X-Name-Last: Sanyal Author-Name: Partha Bhattacharjee Author-X-Name-First: Partha Author-X-Name-Last: Bhattacharjee Author-Name: Sanjeev Pippal Author-X-Name-First: Sanjeev Author-X-Name-Last: Pippal Title: Indel-K2P: a modified Kimura 2 Parameters (K2P) model to incorporate insertion and deletion (Indel) information in phylogenetic analysis Abstract: Evolutionary models are widely used to estimate the evolutionary relationship between the various biological taxa . Majority of the existing evolutionary models ignore insertion and deletion (indel) event, which reduces the computational difficulties, but at the same time, it causes loss of valuable phylogenetic information. In this study, we have developed a modified Kimura 2 parameters (K2P) model to utilise the indel information in phylogenetic tree construction especially in case of low substitution rate sequences Indel rich highly similar DNA sequences (trnL-trnF intergenic spacer region) of Phalaenopsis were collected from Genbank and to test the efficiency of the model in phylogenetic. Our developed Indel-K2P model and K2P model were implemented in MATLAB and calculated the bootstrap value and Robinson-Foulds (RF) distance to test the confidence and accuracy of phylogenetic tree topology. The phylogenetic trees constructed within the framework of Indel-K2P model, exhibited 92.66% accuracy and 40.9% root node confidence while the K2P model without indel shows less accuracy and less root node confidence. Our results indicate that modified Kimura 2 parameters with indel (Indel-K2P) model performed better than Kimura 2 Parameters (K2P) in phylogenetic tree construction for indel rich DNA sequences. Journal: Cyber-Physical Systems Pages: 32-44 Issue: 1 Volume: 8 Year: 2022 Month: 01 X-DOI: 10.1080/23335777.2021.1879274 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1879274 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:1:p:32-44 Template-Type: ReDIF-Article 1.0 Author-Name: Nadia Niknami Author-X-Name-First: Nadia Author-X-Name-Last: Niknami Author-Name: Jie Wu Author-X-Name-First: Jie Author-X-Name-Last: Wu Title: A constraint partially observable semi-Markov decision process for the attack–defence relationships in various critical infrastructures Abstract: Gaining a better understanding of the relationship between attackers and defenders in cybersecurity domains to protect computer systems is of great importance. From the defender’s side, it is critical to choose the best reaction to maintain the system in a safe state, based on a given estimate of the attacker. One of the main challenges is that the defender may not be able to correctly detect a current attack due to incomplete and noisy information . Another important factor in the attack-defence interaction is the limited budget of both attackers and defenders. . This paper focuses on an approach based on interactions between the attacker and defender by considering the problem of uncertainty and limitation of resources for the defender, given that the attacker’s actions are given in all states of a Markov chain. The best actions by the defender can be characterised by a Markov Decision Process in the case of partial observability and importance of time in the expected reward, which is a Partially Observable Semi-Markov Decision model. Our simulation on a trace-based data set demonstrates that the proposed approach handles analysing interactions of the attacker and defender with limited budgets foralong with imperfect information for the defender. Journal: Cyber-Physical Systems Pages: 85-110 Issue: 2 Volume: 8 Year: 2022 Month: 04 X-DOI: 10.1080/23335777.2021.1879935 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1879935 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:2:p:85-110 Template-Type: ReDIF-Article 1.0 Author-Name: Gautham Nayak Seetanadi Author-X-Name-First: Gautham Author-X-Name-Last: Nayak Seetanadi Author-Name: Karl-Erik Årzen Author-X-Name-First: Karl-Erik Author-X-Name-Last: Årzen Author-Name: Martina Maggio Author-X-Name-First: Martina Author-X-Name-Last: Maggio Title: Control-based event-driven bandwidth allocation scheme for video-surveillance systems Abstract: Modern computer systems consist of large number of entities connected through a shared resource. One such system is a video surveillance network consisting of a set of cameras and a network manager. The surveillance cameras capture a stream of images, encode them with a quality factor and transmit them to the manager over a shared constrained network. The central manager allocates bandwidth to the cameras in a fair manner using a threshold based game-theoretic approach. The presence of these multiple control loops that interact with each other leads to complexity in providing performance and safety guarantees.Our previous work explored performance of the event-based manager using model checking to verify relevant properties of linear models. In this paper we build on our previous work by verifying complex camera models that capture uncertainties during image capture. We model the uncertainties using probabilistic Markov Decision Processes (MDPs) and verify relevant properties of the system. We also evaluate system performance for different system parameters with varying triggering thresholds, showing the advantage of model checking for safe and informed parameter selection. Finally, we evaluate the effect of varying thresholds on manager interventions by capturing images on a commercial off-the-shelf (COTS) camera test-bed. Journal: Cyber-Physical Systems Pages: 111-137 Issue: 2 Volume: 8 Year: 2022 Month: 04 X-DOI: 10.1080/23335777.2021.1887364 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1887364 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:2:p:111-137 Template-Type: ReDIF-Article 1.0 Author-Name: Sheng Zhao Author-X-Name-First: Sheng Author-X-Name-Last: Zhao Author-Name: Zhengtian Wu Author-X-Name-First: Zhengtian Author-X-Name-Last: Wu Title: Optimisation model of micro grid dispatching for smart building cluster based on blockchain Abstract: With the rapid development of Chinese economy, the problem of building energy consumption is becoming more prominent. The application of distributed energy brings new solutions for building energy conservation. However, the traditional centralised aggregator approach has many disadvantages. This paper proposes an autonomous decentralized dispatching framework based on blockchain technology. The participating nodes can transfer and record data to each other through the established P2P energy blockchain network. The simulation result shows that the decentralized micro grid dispatching approach proposed in this paper canreduce the cost of distributed energy dispatching. Journal: Cyber-Physical Systems Pages: 138-171 Issue: 2 Volume: 8 Year: 2022 Month: 04 X-DOI: 10.1080/23335777.2021.1887365 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1887365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:2:p:138-171 Template-Type: ReDIF-Article 1.0 Author-Name: Tianchuang Meng Author-X-Name-First: Tianchuang Author-X-Name-Last: Meng Author-Name: Jin Huang Author-X-Name-First: Jin Author-X-Name-Last: Huang Author-Name: Huiqian Li Author-X-Name-First: Huiqian Author-X-Name-Last: Li Author-Name: Zengkun Li Author-X-Name-First: Zengkun Author-X-Name-Last: Li Author-Name: Yu Jiang Author-X-Name-First: Yu Author-X-Name-Last: Jiang Author-Name: Zhihua Zhong Author-X-Name-First: Zhihua Author-X-Name-Last: Zhong Title: Q-Learning Based Optimisation Framework for Real-Time Mixed-Task Scheduling Abstract: Mixed periodic and aperiodic tasks with explicit deterministic or probabilistic timing requirements are becoming increasingly deployed in real-time industry control systems. Such systems pose significant challenges to the scheduling algorithms because the failure of scheduling can be catastrophic. In the past decades, significant research effort has been dedicated on the scheduling problems, and various scheduling algorithms were proposed to meet various system requirements and task loads. However, a single fixed scheduling algorithm usually cannot fully satisfy the requirements for a dynamic mixed-task-set, which is commonly found in modern complex real-time control systems. It is thus extremely hard for engineers to design a set of scheduling solutions to guarantee the correctness and optimality under all conditions. Aiming at optimising the scheduling performance in a real-time control system, this paper proposes a Q-learning-based optimisation framework to select proper scheduling algorithms for the mixed-task-set. Built on a three-layer perceptron network, our Q-learning framework is able to efficiently and effectively choose scheduling algorithms that dynamically adapt to the characteristics of task-sets. Experimental results using real-world data proved the effectiveness of the proposed framework. Journal: Cyber-Physical Systems Pages: 173-191 Issue: 3 Volume: 8 Year: 2022 Month: 07 X-DOI: 10.1080/23335777.2021.1900922 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1900922 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:3:p:173-191 Template-Type: ReDIF-Article 1.0 Author-Name: Ende Zhang Author-X-Name-First: Ende Author-X-Name-Last: Zhang Author-Name: Jin Huang Author-X-Name-First: Jin Author-X-Name-Last: Huang Author-Name: Yue Gao Author-X-Name-First: Yue Author-X-Name-Last: Gao Author-Name: Yau Liu Author-X-Name-First: Yau Author-X-Name-Last: Liu Author-Name: Yangdong Deng Author-X-Name-First: Yangdong Author-X-Name-Last: Deng Title: A hierarchical perception decision-making framework for autonomous driving Abstract: Self-driving vehicles have attracted significant attention from both industry and academy. Despite the intensive research efforts on the perception model of environment-awareness, it is still challenging to attain accurate decision-making under real-world driving scenarios. Today’s state-of-the-art solutions typically hinge on end-to-end DNN-based perception-control models, which provide a rather direct way of driving decision-making. However, DNN models may fail in dealing with complex driving scenarios that require relational reasoning. This paper proposes a hierarchical perception decision-making framework for autonomous driving by employing hypergraph-based reasoning, which enables fuse multi-perceptual models to integrate multimodal environmental information. The proposed framework utilises the high-order correlations behind driving behaviours, and thus allows better relational reasoning and generalisation to achieve more precise driving decisions. Our work outperforms state-of-the-art results on Udacity, Berkeley DeepDrive Video and DBNet data sets. The proposed techniques can be used to construct a unified driving decision-making framework for modular integration of autonomous driving systems. Journal: Cyber-Physical Systems Pages: 192-209 Issue: 3 Volume: 8 Year: 2022 Month: 07 X-DOI: 10.1080/23335777.2021.1901147 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1901147 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:3:p:192-209 Template-Type: ReDIF-Article 1.0 Author-Name: Fouzia Maamri Author-X-Name-First: Fouzia Author-X-Name-Last: Maamri Author-Name: Sofiane Bououden Author-X-Name-First: Sofiane Author-X-Name-Last: Bououden Author-Name: Ilyes Boulkaibet Author-X-Name-First: Ilyes Author-X-Name-Last: Boulkaibet Title: Identification of Chua’s chaotic circuit parameters using penguins search optimisation algorithm Abstract: In this paper, the Penguins Search optimisation (PeSOA) Algorithm is used to identify optimal control parameters of the Chua circuit. The PeSOA algorithm, which is one of the nature-inspired algorithms, is mainly based on the collaborative hunting concept of penguins. In this algorithm, each penguin individually starts its search process, then communicates its position and the number of fish found to his group. The main objective of this strategy is to synchronise dives among the group in order to achieve a global solution. In this paper, a PeSOA algorithm is adopted to explore the search space for locating the optimum intervals and identify the unknown Chua’s system parameters without any partial knowledge of the internal structure. The identified parameters, obtained by minimising the objective function between the estimated and the output values of the system, are used to obtain stable oscillations. The obtained results show that the PeSOA algorithm gives accurate results and the identified parameters produce a stable oscillation of Chua’s chaotic circuit. Journal: Cyber-Physical Systems Pages: 233-260 Issue: 3 Volume: 8 Year: 2022 Month: 07 X-DOI: 10.1080/23335777.2021.1921038 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1921038 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:3:p:233-260 Template-Type: ReDIF-Article 1.0 Author-Name: Mutaz M. Hamdan Author-X-Name-First: Mutaz M. Author-X-Name-Last: Hamdan Author-Name: Magdi S. Mahmoud Author-X-Name-First: Magdi S. Author-X-Name-Last: Mahmoud Title: Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks Abstract: Cyber Physical Systems (CPSs) are defined as the integrations of computation, control, and communication to obtain a prespecified behaviour of the physical processes. Due to their nature, CPSs could be highly affected by security threats. In this research, a secure filter for discrete-time delayed nonlinear systems affected by the two major kinds of cyber attacks i.e. denial-of-service (DoS) and deception attacks is proposed. The cyber attacks are modelled as Bernoulli distributed white sequences with variable probabilities. First, a predefined level of security is guaranteed by setting a sufficient condition using the techniques of stochastic analysis. Second, we obtain the gains of the proposed filter by solving a linear matrix inequality using YALMIP and MATLAB/Simulink. Finally, a numerical example is solved to show the effectiveness of this method on CPSs. Journal: Cyber-Physical Systems Pages: 210-232 Issue: 3 Volume: 8 Year: 2022 Month: 07 X-DOI: 10.1080/23335777.2021.1916230 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1916230 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:3:p:210-232 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1924283_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: S M A K Azad Author-X-Name-First: S M A K Author-X-Name-Last: Azad Author-Name: Srinivasan Kannan Author-X-Name-First: Srinivasan Author-X-Name-Last: Kannan Title: Bandwidth assessment of scheduled and unscheduled communication in hybrid networked control system Abstract: The large integrated industrial applications require unified communication to combine data from multiple domains forming a hybrid network. The scheduling of network access time to multi-domain data in an industrial hybrid network is a challenging task. This paper extends the contribution of the network model mentioned in the literature to assess the bandwidth of both the scheduled and unscheduled communication in hybrid networked control systems. This paper's contribution includes four phases as follows: a) simulation of a hybrid networked control system (h-NCS) consists of four domains with different bandwidth allocations for an application of transmitting a data packet over a network stack from wired node to the wireless node. b) the mathematical demonstration of TCP and IEEE802.11b related to domains incorporated in h-NCS for data transmission. c) the normalisation of the bandwidth of the network access time for both scheduled and unscheduled data packets of h-NCS by implementing Dempster’s rule of combination. d) comparison analysis of proposed h-NCS with the traditional NCS for network access time utilised by both the scheduled and unscheduled data transmission. Journal: Cyber-Physical Systems Pages: 321-346 Issue: 4 Volume: 8 Year: 2022 Month: 10 X-DOI: 10.1080/23335777.2021.1924283 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1924283 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:4:p:321-346 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1922502_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Leepakshi Bindra Author-X-Name-First: Leepakshi Author-X-Name-Last: Bindra Author-Name: Kalvin Eng Author-X-Name-First: Kalvin Author-X-Name-Last: Eng Author-Name: Omid Ardakanian Author-X-Name-First: Omid Author-X-Name-Last: Ardakanian Author-Name: Eleni Stroulia Author-X-Name-First: Eleni Author-X-Name-Last: Stroulia Title: Flexible, decentralised access control for smart buildings with smart contracts Abstract: Large commercial buildings are complex cyber-physical systems containing expensive and critical equipment that ensure the safety and comfort of their numerous occupants. Yet occupant and visitor access to spaces and equipment within these buildings are still managed through unsystematic, inefficient, and human-intensive processes. As a standard practice, long-term building occupants are given access privileges to rooms and equipment based on their organisational roles, while visitors have to be escorted by their hosts. This approach is conservative and inflexible. In this paper, we describe a methodology that can flexibly and securely manage building access privileges for long-term occupants and short-term visitors alike, taking into account the risk associated with accessing each space within the building. Our methodology relies on blockchain smart contracts to describe, grant, audit, and revoke fine-grained permissions for building occupants and visitors, in a decentralised fashion. The smart contracts are specified through a process that leverages the information compiled from Brick and BOT models of the building. We illustrate the proposed method through a typical application scenario in the context of a real office building and argue that it can greatly reduce the administration overhead, while, at the same time, providing fine-grained, auditable access control.CCS Concepts: Security and privacy; Security services; Computer systems organisation; Embedded and cyber-physical systems; Sensors and actuators Journal: Cyber-Physical Systems Pages: 286-320 Issue: 4 Volume: 8 Year: 2022 Month: 10 X-DOI: 10.1080/23335777.2021.1922502 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1922502 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:4:p:286-320 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1921851_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Fengting Zhu Author-X-Name-First: Fengting Author-X-Name-Last: Zhu Author-Name: Yan Peng Author-X-Name-First: Yan Author-X-Name-Last: Peng Author-Name: Min Cheng Author-X-Name-First: Min Author-X-Name-Last: Cheng Author-Name: Jun Luo Author-X-Name-First: Jun Author-X-Name-Last: Luo Author-Name: Yueying Wang Author-X-Name-First: Yueying Author-X-Name-Last: Wang Title: Finite-time observer-based trajectory tracking control of underactuated USVs using hierarchical non-singular terminal sliding mode Abstract: In this paper, a finite-time control method has been proposed for underactuated unmanned surface vehicles (USVs) with external disturbances in order to implement trajectory tracking control. Considering the complexity of the marine environment and the high-accuracy and rapidity required by USVs to complete complex marine missions, such as water quality detection, underwater pipe-laying, rescue operations and so on, a novel hierarchical sliding mode base on non-singular terminal sliding mode control (NTSMC) method is designed for underactuated USVs to ensure that all tracking error can faster converge to a neighbourhood around zero within finite time and address effectively the singularity problem which always exist in terminal sliding mode control (TSMC). The underactuated problem is addressed by hierarchical sliding mode technique. Meanwhile, the dynamic surface control (DSC) is employed to address the explosion problem of computational complexity in traditional method. Further, a novel finite-time disturbance observer (FDO) is devised to estimate accurately the unknown environmental disturbances and for practicality, a saturation constraint function is used to limit the input of the controller. Finally, the effectiveness and stability of the proposed method are validated by simulations and comparisons. Journal: Cyber-Physical Systems Pages: 263-285 Issue: 4 Volume: 8 Year: 2022 Month: 10 X-DOI: 10.1080/23335777.2021.1921851 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1921851 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:8:y:2022:i:4:p:263-285 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1924285_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Jiayu Dong Author-X-Name-First: Jiayu Author-X-Name-Last: Dong Author-Name: Meijiao Zhao Author-X-Name-First: Meijiao Author-X-Name-Last: Zhao Author-Name: Min Cheng Author-X-Name-First: Min Author-X-Name-Last: Cheng Author-Name: Yueying Wang Author-X-Name-First: Yueying Author-X-Name-Last: Wang Title: Integral terminal sliding-mode integral backstepping adaptive control for trajectory tracking of unmanned surface vehicle Abstract: The trajectory tracking method for an unmanned surface vehicle (USV) using integral terminal sliding mode integral backstepping adaptive control (ITSMIBAC) scheme is presented in this paper, which takes into account external disturbances and uncertain model parameters. Furthermore, finite-time convergence and excellent track tracking effect are guaranteed by the differential equations that is made up of the integral terminal sliding mode function. In particular, a backstepping method adding integral term is used to ensure the globally asymptotic stability of system and make the differential equations to converge to zero. The upper bound of the disturbances including external disturbances and uncertain model parameters is estimated by an adaptive control law. Finally, the effectiveness and the feasibility of the proposed controller are demonstrated by numerical example and comparison result through tracking circular orbit. Journal: Cyber-Physical Systems Pages: 77-96 Issue: 1 Volume: 9 Year: 2023 Month: 01 X-DOI: 10.1080/23335777.2021.1924285 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1924285 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:1:p:77-96 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1924284_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: VishnuPriya. A Author-X-Name-First: VishnuPriya. Author-X-Name-Last: A Author-Name: Hiran Kumar Singh Author-X-Name-First: Hiran Kumar Author-X-Name-Last: Singh Author-Name: SivaChaitanyaPrasad. M Author-X-Name-First: SivaChaitanyaPrasad. Author-X-Name-Last: M Author-Name: JaiSivaSai. G Author-X-Name-First: JaiSivaSai. Author-X-Name-Last: G Title: RNN-LSTM Based Deep Learning Model for Tor Traffic Classification Abstract: Tor is an anonymous browser software running on an overlay network. Due to the nature of the end-to-end encryption channel, it is hard to analyse the network traffic. Thus, intruders prefer the Tor browser to hide their identity and access the offensive content. Tor relays are secure from network monitoring, tracking and surveillance. There are so many research contributions for tracking the network traffic and classifying it based on various features and attributes. In this paper, we explained RNN-LSTM-based deep learning model to classify the network traffic based on their nature Tor/non-Tor. We have tested the model with open data sets ISCXTor2016 data sets and samples retrieved in our environment using CIC-flowmeter-4.0. The binary classification model using RNN-LSTM classifies the network traffic with better accuracy and precision. The same experiment conducted in the traditional deep neural network model provides large false positives and false negatives. Here we also present a detailed study and analysis of the model compare with ANN classifiers and genetic-based feature selection method. Journal: Cyber-Physical Systems Pages: 25-42 Issue: 1 Volume: 9 Year: 2023 Month: 01 X-DOI: 10.1080/23335777.2021.1924284 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1924284 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:1:p:25-42 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1933194_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Bandarupalli Rakesh Author-X-Name-First: Bandarupalli Author-X-Name-Last: Rakesh Author-Name: Parveen Sultana H Author-X-Name-First: Parveen Sultana Author-X-Name-Last: H Title: Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things Abstract: In the modern era, prevalence of the Internet of Things (IoT) devices that have de facto protocol as IPv6 routing protocol for low power and lossy networks (RPL). Yet, RPL protocol is vulnerable to many attacks such as rank attack, password spoofing and more. To this end, most of the works have focused their research on securing the RPL-based IoT network. However, still there exist downsides such as high energy consumption, lack of effective authentication and high packet losses. Motivated by these preceding defects, this paper proposes the Novel Authentication and Secure Trust-based RPL Routing in Mobile sink-supported Internet of Things (SecRPL-MS). At first, SecRPL-MS performs a registration process where all IoT nodes in the network register themselves in the security entity. In this work, the frequent death of IoT nodes is alleviated through deploying mobile sink in the network. If any grid member (GM) node wants to transmit their data to the grid head (GH) node, then it must undergo authentication process. Secure routing is adopted in RPL by utilising the sail fish optimisation algorithm. Each GM node encrypts its sensed data using the prince algorithm before transmitting it to the GH node. The moving points are selected for the mobile sink using the Quantum Inspired Neural Network (QINN) algorithm. This proposed SecRPL-MS performance is evaluated using the Network Simulator 3 (NS3) in terms of the Packet Delivery Ratio (%), Delay (ms), Energy Consumption (mJ), Key Generation Time (ms) and Malicious Node Detection Accuracy (%). The proposed SecRPL-Ms outperforms 23% of malicious node detection accuracy when compared to existing systems, which represent the proposed SecRPL-MS system providing high security by mitigating the following attacks such as rank attack, Sybil attack, blackhole attack and man in the middle attack. Journal: Cyber-Physical Systems Pages: 43-76 Issue: 1 Volume: 9 Year: 2023 Month: 01 X-DOI: 10.1080/23335777.2021.1933194 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1933194 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:1:p:43-76 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1940303_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Huiling Yao Author-X-Name-First: Huiling Author-X-Name-Last: Yao Author-Name: Xing Hu Author-X-Name-First: Xing Author-X-Name-Last: Hu Title: A survey of video violence detection Abstract: As one of the important applications of intelligent video surveillance, violent behaviour detection (VioBD) plays a crucial role in public security and safety. As a particular type of behaviour recognition, VioBD aims to identify whether the behaviours that occurred in the scene is aggressive, such as fighting and assault. To comprehensively analyse the current state and predict the future trend of VioBD research, we survey the existing approaches of VioBD in this work. First, we briefly introduce the basic principle and the challenges of VioBD; Then, we category the existing approaches according to their framework, including the traditional framework, end-to-end deep learning framework, and hybrid deep learning framework. Finally, we introduce the public datasets for evaluating the performance of VioBD approaches and compare their performances on these datasets. Besides, we also summarise the open problems in VioBD and predict its future trends. Journal: Cyber-Physical Systems Pages: 1-24 Issue: 1 Volume: 9 Year: 2023 Month: 01 X-DOI: 10.1080/23335777.2021.1940303 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1940303 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:1:p:1-24 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1946719_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yuan-Yuan Zhao Author-X-Name-First: Yuan-Yuan Author-X-Name-Last: Zhao Author-Name: Qian-qian Duan Author-X-Name-First: Qian-qian Author-X-Name-Last: Duan Title: A Improved Subgradient Lagrangian Relaxation Algorithm for Solving the Stochastic Demand Inventory Routing Problem Abstract: In order to improve the coordination efficiency of vehicle routing problem, a multi-level stochastic demand in ventory routing problem was established in this paper, which minimizes the total cost of the system by determining the relation among inventory of distribution center, fleets, and customer needs. Solving the Lagrangian dual problem by the traditional subgradient Lagrangian relaxation algorithm may easily cause oscillation and then slow down the solving speed. To tackle the problem, an improved subgradient Lagrangian relaxation algorithm was proposed. Compared with the traditional subgradient algorithm , the proposed method is faster and improves the quality of the approximate solution. Journal: Cyber-Physical Systems Pages: 174-192 Issue: 2 Volume: 9 Year: 2023 Month: 04 X-DOI: 10.1080/23335777.2021.1946719 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1946719 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:2:p:174-192 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2016982_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Mengkai Chen Author-X-Name-First: Mengkai Author-X-Name-Last: Chen Author-Name: Baochuan Fu Author-X-Name-First: Baochuan Author-X-Name-Last: Fu Author-Name: Zhenping Chen Author-X-Name-First: Zhenping Author-X-Name-Last: Chen Author-Name: Jianhan Wu Author-X-Name-First: Jianhan Author-X-Name-Last: Wu Title: Transaction model and energy management optimisation method of rural microgrid Abstract: Owing to the wide distribution of rural areas, the construction of power facilities is not perfect, which poses a great challenge to the power supply stability of the rural power grid. As an important supplement, the microgrid (MG) plays a complementary role in improving the power supply quality. However, the addition of the MG increases the complexity, and how to balance the interests of the participants has become a substaintial problem. Based on the analysis of the power consumption characteristics of rural residential, agricultural and industrial areas, a game relationship model between MG operators and power users is established, and the overall optimal strategy is obtained in this paper. For consumers, it can effectively achieve the effect of ‘peak shaving and valley filling’ and reduce the cost of electricity. For MG operators, it can improve the consumption rate of renewable energy and increase revenue. Journal: Cyber-Physical Systems Pages: 122-143 Issue: 2 Volume: 9 Year: 2023 Month: 04 X-DOI: 10.1080/23335777.2021.2016982 File-URL: http://hdl.handle.net/10.1080/23335777.2021.2016982 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:2:p:122-143 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1992798_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Vishnu V.M. Author-X-Name-First: Vishnu Author-X-Name-Last: V.M. Author-Name: Manjunath P Author-X-Name-First: Manjunath Author-X-Name-Last: P Title: ProSD-EdgeIoT: Protected Cluster assisted SDWSN for Tetrad Edge-IoT by Collaborative DDoS Detection and Mitigation Abstract: Software-Defined Networking (SDN) and Edge computing are the major elements due to its scalability, flexibility and efficiency. Still, security is one of the significant issues.  Distributed Denial of Service (DDoS) is the harmful attack that exhausts many resources. The existing solutions consume large time for detection and present poor mitigation schemes. To address these issues, this paper presents a Protected Cluster-assisted SDWSN for Edge-IoT (ProSD-EdgeIoT) architecture. The ProSD-EdgeIoT follows tetrad architecture that performs clustering in the device layer, first-level DDoS detection in the edge layer,second-level DDoS detection in the control layer and multi-level DDoS mitigation in data forwarding layer. Journal: Cyber-Physical Systems Pages: 144-173 Issue: 2 Volume: 9 Year: 2023 Month: 04 X-DOI: 10.1080/23335777.2021.1992798 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1992798 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:2:p:144-173 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_1964101_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Surya B Yadav Author-X-Name-First: Surya B Author-X-Name-Last: Yadav Title: A resilient hierarchical distributed model of a cyber physical system Abstract: We present a novel modelling scheme to develop a resilient hierarchical distributed model of industrial cyber-physical systems amenable to feedback control. It advances the current research work on cyber-physical system security and resilience by integrating security and self-adaptation features into each of the self-contained units (subsystems) of a cyber-physical system. We compare the proposed modelling scheme with the extant schemes. The proposed scheme is more comprehensive than the extant research work on resilient modelling scheme. The modelling scheme can be used to design resilient cyber-physical systems and build models to assess their security and resilience. Journal: Cyber-Physical Systems Pages: 97-121 Issue: 2 Volume: 9 Year: 2023 Month: 04 X-DOI: 10.1080/23335777.2021.1964101 File-URL: http://hdl.handle.net/10.1080/23335777.2021.1964101 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:2:p:97-121 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2083689_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Christopher Banks Author-X-Name-First: Christopher Author-X-Name-Last: Banks Author-Name: Samuel Coogan Author-X-Name-First: Samuel Author-X-Name-Last: Coogan Author-Name: Magnus Egerstedt Author-X-Name-First: Magnus Author-X-Name-Last: Egerstedt Title: LTL cross entropy optimisation for quadcopter task orchestration Abstract: This paper presents a task orchestration framework for multi-agent systems utilising linear temporal logic (LTL) and cross entropy optimisation, a stochastic optimisation technique used for rare-event sampling. We define task orchestration as a combination of task decomposition, allocation and planning for a quadcopter or team of quadcopters given a high-level specification. Specifically, we consider tasks that are complex and consist of environment constraints, system constraints, or both, that must be satisfied. We first approach motion planning for the single agent case where transition systems for the environment allow tasks to be developed as linear temporal logic (LTL) specifications. Trajectories are then generated via motion primitives for a single quadcopter and optimised via cross entropy to ensure optimal satisfaction of a cost function. We extend this work to the multi-agent case where a team of homogeneous quadcopters are considered to satisfy an LTL specification. In order to provide faster computations and initial cost-agnostic sampling, we formulate the online version of multi-agent task allocation via cross entropy for tasks specified in LTL specifications. The results of this framework are verified in simulation and experimentally with a team of quadcopters. Journal: Cyber-Physical Systems Pages: 273-312 Issue: 3 Volume: 9 Year: 2023 Month: 07 X-DOI: 10.1080/23335777.2022.2083689 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2083689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:3:p:273-312 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2023651_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Deepak Kshirsagar Author-X-Name-First: Deepak Author-X-Name-Last: Kshirsagar Author-Name: Sandeep Kumar Author-X-Name-First: Sandeep Author-X-Name-Last: Kumar Title: Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques Abstract: The use of machine learning models in intrusion detection systems (IDSs) takes more time to build the model with many features and degrade the performance. The present paper proposes an ensemble of filter feature selection techniques (EFFST) to obtain a significant feature subset for web attack detection by selecting one-fourth split of the ranked features. The experimentation on the CICIDS 2017 dataset shows that the proposed EFFST method provides a detection rate of 99.9909%, with J48 using 24 features. The system’s performance is compared to the original features and traditional relevant feature selection methods employed in IDSs.. Journal: Cyber-Physical Systems Pages: 244-259 Issue: 3 Volume: 9 Year: 2023 Month: 07 X-DOI: 10.1080/23335777.2021.2023651 File-URL: http://hdl.handle.net/10.1080/23335777.2021.2023651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:3:p:244-259 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2051209_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Amir Mohammad Naseri Author-X-Name-First: Amir Mohammad Author-X-Name-Last: Naseri Author-Name: Walter Lucia Author-X-Name-First: Walter Author-X-Name-Last: Lucia Author-Name: Amr Youssef Author-X-Name-First: Amr Author-X-Name-Last: Youssef Title: Confidentiality attacks against encrypted control systems Abstract: Encrypted control systems were introduced to enhance the security of cyber-physical systems, which outsource control action computations to a third-party platform. To protect the confidentiality of the transmitted data, homomorphic encryption schemes are particularly appealing for their capability of allowing computations on encrypted data. By considering the popular ElGamal and Paillier encryption schemes, this paper shows that encrypted control systems are vulnerable to attackers leveraging the inherently small domains of the plaintext data in control systems and the randomisation process required to make the utilised ciphers semantically secure. Finally, we present some countermeasures to defend against these attacks. Journal: Cyber-Physical Systems Pages: 224-243 Issue: 3 Volume: 9 Year: 2023 Month: 07 X-DOI: 10.1080/23335777.2022.2051209 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2051209 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:3:p:224-243 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2104378_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: M. Lydia Author-X-Name-First: M. Author-X-Name-Last: Lydia Author-Name: G. Edwin Prem Kumar Author-X-Name-First: G. Edwin Author-X-Name-Last: Prem Kumar Author-Name: A. Immanuel Selvakumar Author-X-Name-First: A. Immanuel Author-X-Name-Last: Selvakumar Title: Securing the cyber-physical system: a review Abstract: The Cyber-Physical System (CPS) is poised to have a revolutionary impact on almost every area of our lives including transportation, healthcare, energy, automation and other industrial sectors. However, securing the CPS has emerged as a major area of concern. A thorough review on the various security scenarios in CPS, the attacks, the diverse approaches to model different attacks, and the need for CPS testbeds has been presented in this paper. The significance of risk models and risk assessment has also been detailed. The intricate research challenges that are faced in securing the CPS have also been presented. Journal: Cyber-Physical Systems Pages: 193-223 Issue: 3 Volume: 9 Year: 2023 Month: 07 X-DOI: 10.1080/23335777.2022.2104378 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2104378 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:3:p:193-223 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2066181_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Chenguan Xu Author-X-Name-First: Chenguan Author-X-Name-Last: Xu Author-Name: Wenqing Li Author-X-Name-First: Wenqing Author-X-Name-Last: Li Author-Name: Yao Rao Author-X-Name-First: Yao Author-X-Name-Last: Rao Author-Name: Bei Qi Author-X-Name-First: Bei Author-X-Name-Last: Qi Author-Name: Bin Yang Author-X-Name-First: Bin Author-X-Name-Last: Yang Author-Name: Zhongdong Wang Author-X-Name-First: Zhongdong Author-X-Name-Last: Wang Title: Coordinative energy efficiency improvement of buildings based on deep reinforcement learning Abstract: Due to the uncertainty of user’s behaviour and other conditions, the design of energy efficiency improvement methods in buildings is challenging. In this paper, a building energy management method based on deep reinforcement learning is proposed, which solves the energy scheduling problem of buildings with renewable sources and energy storage system and minimises electricity costs while maintaining the user’s comfort. Different from model-based methods, the proposed DRL agent makes decisions only by observing the measurable information without considering the dynamic of the building environment. Simulations based on real data verify the effectiveness of the proposed method. Journal: Cyber-Physical Systems Pages: 260-272 Issue: 3 Volume: 9 Year: 2023 Month: 07 X-DOI: 10.1080/23335777.2022.2066181 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2066181 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:3:p:260-272 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2022765_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Haocheng Yu Author-X-Name-First: Haocheng Author-X-Name-Last: Yu Author-Name: Luyao Yang Author-X-Name-First: Luyao Author-X-Name-Last: Yang Author-Name: Jinyu Dai Author-X-Name-First: Jinyu Author-X-Name-Last: Dai Author-Name: Baoping Jiang Author-X-Name-First: Baoping Author-X-Name-Last: Jiang Author-Name: Zhengtian Wu Author-X-Name-First: Zhengtian Author-X-Name-Last: Wu Author-Name: Shuxian Zhu Author-X-Name-First: Shuxian Author-X-Name-Last: Zhu Title: Fixed-point iterative approach for solving linear Diophantine systems with bounds on the variables Abstract: Systems of linear Diophantine equations arise from several applications. Scholars have given attention to such systems and come up with several effective solutions. A new approach, called the fixed-point iterative method, was proposed to solve linear Diophantine equations with lower and upper bounds on the variables. Two steps are involved in solving this problem. First, the problem is transformed into a polytope judgment problem . Then, the approach is used to judge the existence of an integer point in the polytope. Compared with the branch-and-bound method, results show that the approach is feasible and effective for solving linear Diophantine systems. Journal: Cyber-Physical Systems Pages: 376-389 Issue: 4 Volume: 9 Year: 2023 Month: 10 X-DOI: 10.1080/23335777.2021.2022765 File-URL: http://hdl.handle.net/10.1080/23335777.2021.2022765 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:4:p:376-389 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2104379_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Giacomo Abbattista Author-X-Name-First: Giacomo Author-X-Name-Last: Abbattista Author-Name: Michela Chimienti Author-X-Name-First: Michela Author-X-Name-Last: Chimienti Author-Name: Vincenzo Dentamaro Author-X-Name-First: Vincenzo Author-X-Name-Last: Dentamaro Author-Name: Paolo Giglio Author-X-Name-First: Paolo Author-X-Name-Last: Giglio Author-Name: Donato Impedovo Author-X-Name-First: Donato Author-X-Name-Last: Impedovo Author-Name: Giuseppe Pirlo Author-X-Name-First: Giuseppe Author-X-Name-Last: Pirlo Author-Name: Giacomo Rosato Author-X-Name-First: Giacomo Author-X-Name-Last: Rosato Title: A biometric-based system for unsupervised anomaly behaviour detection at the pawn shop Abstract: This article shows a system performing re-identification and description of people entering different stores of the same franchise by means of Face Recognition, Gait Analysis, and Soft Biometrics techniques. Additionally, an anomaly detection analysis is conducted to identify suspicious behavioral patterns.It has been tested on an ad-hoc dataset of a set of pawn shops of a local franchise.The registered users paths have been human labelled as ‘normal’ or ‘abnormal’ achieving a precision of 100%, recall of 72.72%, and an average accuracy of 96.39%.The system is able to report anomalies to support decisions in a context of a security monitoring system.. Journal: Cyber-Physical Systems Pages: 338-356 Issue: 4 Volume: 9 Year: 2023 Month: 10 X-DOI: 10.1080/23335777.2022.2104379 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2104379 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:4:p:338-356 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2014978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Xuemei Wang Author-X-Name-First: Xuemei Author-X-Name-Last: Wang Author-Name: Xiaona Song Author-X-Name-First: Xiaona Author-X-Name-Last: Song Author-Name: Jingtao Man Author-X-Name-First: Jingtao Author-X-Name-Last: Man Author-Name: Nana Wu Author-X-Name-First: Nana Author-X-Name-Last: Wu Title: Exponential state estimation for reaction-diffusion inertial neural networks via incomplete measurement scheme Abstract: In this paper, the problem of exponential state estimation for inertial neural networks with reaction-diffusion term (RDINNs) via incomplete measurement scheme is investigated. Unlike the full measurement method, this method estimates the system by measuring the state of partially available neurons. First, by constructing an appropriate variable substitution, the second-order system is transformed into a first-order one. Then, a suitable Lyapunov-krasovskii function (LKF) is constructed, and sufficient conditions for the stability of the system are obtained . Finally, the practicality and effectiveness of the proposed method is further verified by two numerical examples. Journal: Cyber-Physical Systems Pages: 357-375 Issue: 4 Volume: 9 Year: 2023 Month: 10 X-DOI: 10.1080/23335777.2021.2014978 File-URL: http://hdl.handle.net/10.1080/23335777.2021.2014978 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:4:p:357-375 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2051210_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Hengshuo Liang Author-X-Name-First: Hengshuo Author-X-Name-Last: Liang Author-Name: Lauren Burgess Author-X-Name-First: Lauren Author-X-Name-Last: Burgess Author-Name: Weixian Liao Author-X-Name-First: Weixian Author-X-Name-Last: Liao Author-Name: Erik Blasch Author-X-Name-First: Erik Author-X-Name-Last: Blasch Author-Name: Wei Yu Author-X-Name-First: Wei Author-X-Name-Last: Yu Title: Deep Learning Assist IoT Search Engine for Disaster Damage Assessment Abstract: In this paper, we address the issue of disaster damage assessments using deep learning (DL) techniques. Specifically, we propose integrating DL techniques into the Internet of Things Search Engine (IoTSE) system to carry out disaster damage assessment. Our approach is to design two scenarios, Single and Complex Event Settings, to complete performance validation using four Convolutional Neural Network (CNN) models. These two scenarios are designed with three possible network services. Our experimental results confirm that all four CNN models can learn each label during the single event setting well. Whereas, with complex event settings, the CNN models have learning difficulty because multiple events have closely related labels. Journal: Cyber-Physical Systems Pages: 313-337 Issue: 4 Volume: 9 Year: 2023 Month: 10 X-DOI: 10.1080/23335777.2022.2051210 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2051210 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:4:p:313-337 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2104380_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Li Lu Author-X-Name-First: Li Author-X-Name-Last: Lu Author-Name: Bo Xiao Author-X-Name-First: Bo Author-X-Name-Last: Xiao Author-Name: Tao Han Author-X-Name-First: Tao Author-X-Name-Last: Han Title: Nonlinear finite-time and fixed-time bipartite consensus tracking of multi-agent systems Abstract: This paper deals with the finite-time and fixed-time bipartite consensus tracking (FFBCT) problems for multi-agent systems (MASs) , in which both cooperative and competition exist. Using Lyapunov stability methods, distributed nonlinear protocols are provided to ensure all agents reach agreement. Its absolute value is the same but it might be different in direction. Besides, the second protocol can make the system reach bipartite consensus in fixed time regardless of the initial state of agents. Moreover, boundaries for settling times are estimated. Some numerical examples are finally presented to prove the validity of our designs. Journal: Cyber-Physical Systems Pages: 390-406 Issue: 4 Volume: 9 Year: 2023 Month: 10 X-DOI: 10.1080/23335777.2022.2104380 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2104380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:9:y:2023:i:4:p:390-406 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2123048_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Yi Yang Author-X-Name-First: Yi Author-X-Name-Last: Yang Author-Name: Chen Peng Author-X-Name-First: Chen Author-X-Name-Last: Peng Author-Name: Li Qing–Kui Author-X-Name-First: Li Author-X-Name-Last: Qing–Kui Title: Modeling and analysis of supply chain with green product change Abstract: This paper proposes a novel method to study the impact of green product change on supply chain performance. First, to promote green consumption and information sharing, government intervention (tax and subsidy) and blockchain are well employed. Then, a series of mathematical models are elaborately developed based on green levels of products. Furthermore, detailed performance analysis of two kinds of supply chains are conducted, in which, the equilibrium results are obtained by using Stackelberg game. Finally, extensive numerical experiments demonstrate that mild green product change intensity together with low blockchain cost can improve supply chain performance. Journal: Cyber-Physical Systems Pages: 84-103 Issue: 1 Volume: 10 Year: 2024 Month: 01 X-DOI: 10.1080/23335777.2022.2123048 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2123048 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:1:p:84-103 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2130434_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Xianggang Liu Author-X-Name-First: Xianggang Author-X-Name-Last: Liu Author-Name: Zhi-Wei Liu Author-X-Name-First: Zhi-Wei Author-X-Name-Last: Liu Author-Name: Ming Chi Author-X-Name-First: Ming Author-X-Name-Last: Chi Author-Name: Guixi Wei Author-X-Name-First: Guixi Author-X-Name-Last: Wei Title: Frequency control for islanded AC microgrid based on deep reinforcement learning Abstract: The incorporation of intermittent and stochastic renewable energy into a microgrid creates frequent fluctuations, which provides new challenges in frequency control. This paper deals with the frequency control problem in the islanded AC microgrid (IACMG) via a model-free deep reinforcement learning (DRL) method, which includes offline learning and online control. Twin-delayed deep deterministic policy gradient is involved to improve the performance of the agent to minimise the frequency deviation. The advantage of the proposed method is self-adaptive to the uncertain IACMG model including renewable energy sources. Finally, the effectiveness and robustness of the proposed controller is demonstrated by four simulation scenarios. Journal: Cyber-Physical Systems Pages: 43-59 Issue: 1 Volume: 10 Year: 2024 Month: 01 X-DOI: 10.1080/23335777.2022.2130434 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2130434 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:1:p:43-59 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2163298_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: Houssam Kanso Author-X-Name-First: Houssam Author-X-Name-Last: Kanso Author-Name: Adel Noureddine Author-X-Name-First: Adel Author-X-Name-Last: Noureddine Author-Name: Ernesto Exposito Author-X-Name-First: Ernesto Author-X-Name-Last: Exposito Title: A Review of Energy Aware Cyber-Physical Systems Abstract: In recent years, the number of connected devices and systems has increased exponentially, along with their daily use. Cyber-Physical Systems (CPS) are complex multi-layered feedback systems that combine computing resources and interaction with the physical environment using sensors and actuators. Energy is considered one of the major concerns driven by the increasing number of connected systems. In this paper, we review current research approaches in energy-aware CPS. We propose a novel architectural methodology to analyse and compare state-of-the-art approaches, on their architectural design and energy-related factors. We finally draw recommendations from our review on how to build energy-aware CPS solutions. Journal: Cyber-Physical Systems Pages: 1-42 Issue: 1 Volume: 10 Year: 2024 Month: 01 X-DOI: 10.1080/23335777.2022.2163298 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2163298 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:1:p:1-42 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2142300_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: André van der Walt Author-X-Name-First: André Author-X-Name-Last: van der Walt Author-Name: Tahmid Quazi Author-X-Name-First: Tahmid Author-X-Name-Last: Quazi Author-Name: Brett van Niekerk Author-X-Name-First: Brett Author-X-Name-Last: van Niekerk Title: Two-stage IDS for IoT using layered machine- and deep-learning models Abstract: The ever-growing integration of Internet-of-Things (IoT) devices into our daily lives provides us with a level of convenience never before seen. However, the effects of attacks on these devices can be devastating. The discrete, low-powered nature of IoT devices makes their security a difficult problem to solve. To provide a solution, this work proposes a two-stage Intrusion Detection Systems (IDS) using layered machine and deep learning models. The potential benefits of the system are examined and the results presented show a reduction of threat detection/identification time of 0.51 s on average and an increase of threat classification F1-Score by 0.05.  Journal: Cyber-Physical Systems Pages: 60-83 Issue: 1 Volume: 10 Year: 2024 Month: 01 X-DOI: 10.1080/23335777.2022.2142300 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2142300 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:1:p:60-83 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2135610_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20231214T103247 git hash: d7a2cb0857 Author-Name: S Sekar Author-X-Name-First: S Author-X-Name-Last: Sekar Author-Name: S Jeyalakshmi Author-X-Name-First: S Author-X-Name-Last: Jeyalakshmi Author-Name: S Ravikumar Author-X-Name-First: S Author-X-Name-Last: Ravikumar Author-Name: D Kavitha Author-X-Name-First: D Author-X-Name-Last: Kavitha Title: Modified light GBM based classification of malicious users in cooperative cognitive radio networks Abstract: This paper proposes the Modified Light GBM to classify the Malicious Users (MUs) and legitimate Secondary Users (SUs) in the cognitive-radio network. The proposed method is to avoid the consequences of malicious users in Cooperative Spectrum Sensing (CSS) without the detection of MUs. The method is tested against the occurrence of Always No Malicious User (ANMU), always yes malicious user (AYMU), the Random Malicious User (RMU), and Opposite Malicious User (OMU) transmitting spectrum sensing data to the Fusion Center (FC) by normal secondary users. The efficiency of the proposed method is expressed via simulations and compared with other existing methods. Journal: Cyber-Physical Systems Pages: 104-122 Issue: 1 Volume: 10 Year: 2024 Month: 01 X-DOI: 10.1080/23335777.2022.2135610 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2135610 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:1:p:104-122 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2244966_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Alireza Sabaghian Author-X-Name-First: Alireza Author-X-Name-Last: Sabaghian Author-Name: Saeed Balochian Author-X-Name-First: Saeed Author-X-Name-Last: Balochian Author-Name: Mohammad Alishahi Author-X-Name-First: Mohammad Author-X-Name-Last: Alishahi Title: Design of a single input control signal for fault-tolerant synchronization of fractional order hyperchaotic Lu system Abstract: The authors of this paper used an adaptive-sliding mode controller (A-SMC) to synchronise two fractional-order hyperchaotic (FOHC) Lu systems in the presence of external disturbance and bounded parametric uncertainty with unknown bounds. They employed the Riemann–Liouville fractional order and defined a new fractional-order sliding surface for the FOHC Lu system to determine a proper active control. Additionally, they utilised adaptive laws to estimate uncertainty bounds and unknown disturbance signals. The authors proved the stability of the closed-loop control system using the Lyapunov theory. Simulation results in MATLAB demonstrated the desirable performance of this method in the presence of disturbance and parametric uncertainty. Journal: Cyber-Physical Systems Pages: 176-196 Issue: 2 Volume: 10 Year: 2024 Month: 04 X-DOI: 10.1080/23335777.2023.2244966 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2244966 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:2:p:176-196 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2214584_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Ênio Vasconcelos Filho Author-X-Name-First: Ênio Author-X-Name-Last: Vasconcelos Filho Author-Name: Ricardo Severino Author-X-Name-First: Ricardo Author-X-Name-Last: Severino Author-Name: Pedro M. Salgueiro dos Santos Author-X-Name-First: Pedro M. Author-X-Name-Last: Salgueiro dos Santos Author-Name: Anis Koubaa Author-X-Name-First: Anis Author-X-Name-Last: Koubaa Author-Name: Eduardo Tovar Author-X-Name-First: Eduardo Author-X-Name-Last: Tovar Title: Cooperative vehicular platooning: a multi-dimensional survey towards enhanced safety, security and validation Abstract: Cooperative Vehicular Platooning (Co-VP) is a prime example of Cooperative Cyber-Physical Systems (Co-CPS), offering great potential for enhancing road safety by reducing human involvement in driving. However, this domain presents significant challenges, incorporating control theory, communications, vehicle dynamics, security, and traffic engineering. This survey explores recent advancements in Co-VP, covering control strategies, communication infrastructures, and cybersecurity. It also examines testing and validation methods, such as simulation tools, hardware-in-the-loop setups, and vehicular testbeds. Lastly, it outlines open challenges within the Co-VP field. This comprehensive overview serves as a guide for further developments in this complex and critical area. Journal: Cyber-Physical Systems Pages: 123-175 Issue: 2 Volume: 10 Year: 2024 Month: 04 X-DOI: 10.1080/23335777.2023.2214584 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2214584 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:2:p:123-175 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2175915_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Zhikang Wang Author-X-Name-First: Zhikang Author-X-Name-Last: Wang Author-Name: Wendi Wu Author-X-Name-First: Wendi Author-X-Name-Last: Wu Author-Name: Zhengtian Wu Author-X-Name-First: Zhengtian Author-X-Name-Last: Wu Author-Name: Baochuan Fu Author-X-Name-First: Baochuan Author-X-Name-Last: Fu Title: Microgrid trading mechanism enhancement for smart contract considering reputation values Abstract: In order to reduce the system instability caused by credit risk in microgrid transactions in the blockchain, we propose a smart contract microgrid transaction model considering reputation value. Considering the instability caused by credit risk, the reputation factor is introduced to ensure the secure and stable operation of the microgrid energy trading system. The effectiveness of the scheme is verified by comparing traditional electricity trading and the trading with the introduced credit value scheme through simulation experiments. Journal: Cyber-Physical Systems Pages: 214-230 Issue: 2 Volume: 10 Year: 2024 Month: 04 X-DOI: 10.1080/23335777.2023.2175915 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2175915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:2:p:214-230 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2163705_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Zhongting Huang Author-X-Name-First: Zhongting Author-X-Name-Last: Huang Author-Name: Yongyi Chen Author-X-Name-First: Yongyi Author-X-Name-Last: Chen Author-Name: Jianjun Liu Author-X-Name-First: Jianjun Author-X-Name-Last: Liu Author-Name: Hongjie Ni Author-X-Name-First: Hongjie Author-X-Name-Last: Ni Author-Name: Dan Zhang Author-X-Name-First: Dan Author-X-Name-Last: Zhang Title: Rolling bearing fault diagnosis based on the enhanced channel attention network Abstract: This paper proposes a rolling bearing fault diagnosis method based on the enhanced channel attention network. The vibration signals are collected via a wireless sensor node, which are input to the neural network, and channel attention block is used to strengthen the assignment of important features, so that the attention of network is paid onto the critical fault information. Furthermore, channel attention block and residual convolution block are combined to form an enhanced channel attention network to extract the detail features. Experiment results show that the model can achieve 100% recognition accuracy for rolling bearings in various working conditions. It is also shown that the proposed new learning algorithm can provide a higher diagnosis accuracy than those state-of-the-arts in a strong disturbance environment, which reflects better robustness and generalisation ability. Journal: Cyber-Physical Systems Pages: 197-213 Issue: 2 Volume: 10 Year: 2024 Month: 04 X-DOI: 10.1080/23335777.2022.2163705 File-URL: http://hdl.handle.net/10.1080/23335777.2022.2163705 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:2:p:197-213 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2263502_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Jue Hou Author-X-Name-First: Jue Author-X-Name-Last: Hou Author-Name: Tingzhe Pan Author-X-Name-First: Tingzhe Author-X-Name-Last: Pan Author-Name: Xinlei Cai Author-X-Name-First: Xinlei Author-X-Name-Last: Cai Author-Name: Xin Jin Author-X-Name-First: Xin Author-X-Name-Last: Jin Author-Name: Zijie Meng Author-X-Name-First: Zijie Author-X-Name-Last: Meng Author-Name: Hongxuan Luo Author-X-Name-First: Hongxuan Author-X-Name-Last: Luo Title: Incremental segmented slope residential load pattern clustering based on three-stage curve profiles Abstract: This paper tackles high computational complexity in using Euclidean distance for residential load profiles (RLPs) similarity by proposing a three-stage incremental segmented slope clustering framework. The first two stages involve static clustering, where we obtain typical residential load profiles through piecewise slope clustering. In the third stage, dynamic clustering is performed based on the slope similarity of RLPs. This method enhances clustering performance and reduces computation cost, outperforming various benchmarks, with simulation results confirming the framework's effectiveness. Journal: Cyber-Physical Systems Pages: 263-282 Issue: 3 Volume: 10 Year: 2024 Month: 07 X-DOI: 10.1080/23335777.2023.2263502 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2263502 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:3:p:263-282 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2301106_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Yusuf Qwareeq Author-X-Name-First: Yusuf Author-X-Name-Last: Qwareeq Author-Name: Abdalaziz Sawwan Author-X-Name-First: Abdalaziz Author-X-Name-Last: Sawwan Author-Name: Jie Wu Author-X-Name-First: Jie Author-X-Name-Last: Wu Title: Maximum elastic scheduling of virtual machines in general graph cloud data center networks Abstract: In this research, we pioneer a novel method to evaluate the maximum admissible load (MAL) for virtual machines (VMs) in physical machines (PMs) in data centre networks (DCNs), without restricting DCN topologies. This unique approach simplifies the issue into a single-source, multiple-sink maximum flow problem. It also resolves the maximum elastic scheduling problem by determining the optimal load for consistent growth without reassigning tasks. An effective strategy for these challenges is introduced and validated through extensive simulations. Journal: Cyber-Physical Systems Pages: 283-301 Issue: 3 Volume: 10 Year: 2024 Month: 07 X-DOI: 10.1080/23335777.2023.2301106 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2301106 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:3:p:283-301 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2177750_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Huimin Li Author-X-Name-First: Huimin Author-X-Name-Last: Li Author-Name: Yongyi Cheng Author-X-Name-First: Yongyi Author-X-Name-Last: Cheng Author-Name: Hongjie Ni Author-X-Name-First: Hongjie Author-X-Name-Last: Ni Author-Name: Dan Zhang Author-X-Name-First: Dan Author-X-Name-Last: Zhang Title: Dual-path recommendation algorithm based on CNN and attention-enhanced LSTM Abstract: To recommend useful information to users more efficiently, this paper proposes a dual-path recommendation algorithm which combines multilayer Convolutional Neural Network (CNN) and attention-enhanced long short-term memory network (Attention-LSTM). Firstly, the matrix factorisation technique is used for learning the long-term preferences of users. Secondly, a dual-path network based on CNN and LSTM is constructed to perform feature extraction on the rating matrix. The dual-path network can learn the long-term preferences of users while capturing their dynamic preferences in changing preferences. The algorithm is tested on the public dataset MovieLens-1M, and the MAE value reflects the accuracy of the algorithm.  Journal: Cyber-Physical Systems Pages: 247-262 Issue: 3 Volume: 10 Year: 2024 Month: 07 X-DOI: 10.1080/23335777.2023.2177750 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2177750 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:3:p:247-262 Template-Type: ReDIF-Article 1.0 # input file: TCYB_A_2260804_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Bhagyesh B. Deshmukh Author-X-Name-First: Bhagyesh B. Author-X-Name-Last: Deshmukh Author-Name: Vijay A. Athavale Author-X-Name-First: Vijay A. Author-X-Name-Last: Athavale Author-Name: Aditya R. Vernekar Author-X-Name-First: Aditya R. Author-X-Name-Last: Vernekar Author-Name: Yash R. Katkar Author-X-Name-First: Yash R. Author-X-Name-Last: Katkar Author-Name: Anirudha K. Jahagirdar Author-X-Name-First: Anirudha K. Author-X-Name-Last: Jahagirdar Author-Name: Yash C. Waghmare Author-X-Name-First: Yash C. Author-X-Name-Last: Waghmare Author-Name: Sachin Salunkhe Author-X-Name-First: Sachin Author-X-Name-Last: Salunkhe Author-Name: Sharad Gawade Author-X-Name-First: Sharad Author-X-Name-Last: Gawade Title: Development of a digital twin of heat energy storage and retrieval system for performance evaluation through AR-based simulation Abstract: The research introduces an innovative method for creating a digital twin (DT) of heat energy storage and retrieval system (HESRS) for real-time monitoring and performance analysis. The HESRS, type of HVAC system, is evaluated based on parameters like stored heat energy, heat extraction via heat transfer fluid (HTF), and Phase Change Material (PCM) temperatures. Data from temperature sensors is sent to the cloud in real-time. A reduced-order model (ROM) analyses it on the cloud and sends results to an Android app. The DT is then simulated in augmented reality through our app, Twin-X, marking distinctive approach to digital twin development. Journal: Cyber-Physical Systems Pages: 231-246 Issue: 3 Volume: 10 Year: 2024 Month: 07 X-DOI: 10.1080/23335777.2023.2260804 File-URL: http://hdl.handle.net/10.1080/23335777.2023.2260804 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:tcybxx:v:10:y:2024:i:3:p:231-246