Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    A Stroke-Limitation AMD Control System with Variable Gain and Limited Area for High-Rise Buildings

    Zuo-Hua Li1, Qing-Gui Wu1,*, Jun Teng1,*, Chao-Jun Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 865-884, 2024, DOI:10.32604/cmes.2023.029927

    Abstract Collisions between a moving mass and an anti-collision device increase structural responses and threaten structural safety. An active mass damper (AMD) with stroke limitations is often used to avoid collisions. However, a stroke-limited AMD control system with a fixed limited area shortens the available AMD stroke and leads to significant control power. To solve this problem, the design approach with variable gain and limited area (VGLA) is proposed in this study. First, the boundary of variable-limited areas is calculated based on the real-time status of the moving mass. The variable gain (VG) expression at the variable limited area is deduced… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2) A request response-based convolutional neural… More >

  • Open Access

    ARTICLE

    A Novel Deep Learning Representation for Industrial Control System Data

    Bowen Zhang1,2,3, Yanbo Shi4, Jianming Zhao1,2,3,*, Tianyu Wang1,2,3, Kaidi Wang5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2703-2717, 2023, DOI:10.32604/iasc.2023.033762

    Abstract Feature extraction plays an important role in constructing artificial intelligence (AI) models of industrial control systems (ICSs). Three challenges in this field are learning effective representation from high-dimensional features, data heterogeneity, and data noise due to the diversity of data dimensions, formats and noise of sensors, controllers and actuators. Hence, a novel unsupervised learning autoencoder model is proposed for ICS data in this paper. Although traditional methods only capture the linear correlations of ICS features, our deep industrial representation learning model (DIRL) based on a convolutional neural network can mine high-order features, thus solving the problem of high-dimensional and heterogeneous… More >

  • Open Access

    ARTICLE

    Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

    Samah Alshathri1, Ezz El-Din Hemdan2, Walid El-Shafai3,4,*, Amged Sayed5,6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 183-196, 2023, DOI:10.32604/cmc.2023.034048

    Abstract In recent years, Digital Twin (DT) has gained significant interest from academia and industry due to the advanced in information technology, communication systems, Artificial Intelligence (AI), Cloud Computing (CC), and Industrial Internet of Things (IIoT). The main concept of the DT is to provide a comprehensive tangible, and operational explanation of any element, asset, or system. However, it is an extremely dynamic taxonomy developing in complexity during the life cycle that produces a massive amount of engendered data and information. Likewise, with the development of AI, digital twins can be redefined and could be a crucial approach to aid the… More >

  • Open Access

    ARTICLE

    Development of Energy Management System for Micro Grid Operation

    S. Jayaprakash1,*, B. Gopi2, Murugananth Gopal Raj3, S. Sujith4, S. Deepa5, S. Swapna6

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2537-2551, 2023, DOI:10.32604/csse.2023.032038

    Abstract The introduction of several small and large-scale industries, malls, shopping complexes, and domestic applications has significantly increased energy consumption. The aim of the work is to simulate a technically viable and economically optimum hybrid power system for residential buildings. The proposed micro-grid model includes four power generators: solar power, wind power, Electricity Board (EB) source, and a Diesel Generator (DG) set, with solar and wind power performing as major sources and the EB supply and DG set serving as backup sources. The core issue in direct current to alternate current conversion is harmonics distortion, a five-stage multilevel inverter is employed… More >

  • Open Access

    ARTICLE

    TRUSED: A Trust-Based Security Evaluation Scheme for A Distributed Control System

    Saqib Ali1,*, Raja Waseem Anwar2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4381-4398, 2023, DOI:10.32604/cmc.2023.031472

    Abstract Distributed control systems (DCS) have revolutionized the communication process and attracted more interest due to their pervasive computing nature (cyber/physical), their monitoring capabilities and the benefits they offer. However, due to distributed communication, flexible network topologies and lack of central control, the traditional security strategies are inadequate for meeting the unique characteristics of DCS. Moreover, malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network. Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node, which reduces the risk and… More >

  • Open Access

    ARTICLE

    Control System Design for Low Power Magnetic Bearings in a Flywheel Energy Storage System

    Tinnawat Hongphan1, Matthew O. T. Cole1,*, Chakkapong Chamroon1, Ziv Brand2

    Energy Engineering, Vol.120, No.1, pp. 147-161, 2023, DOI:10.32604/ee.2022.022821

    Abstract This paper presents a theoretical and experimental study on controller design for the AMBs in a small-scale flywheel energy storage system, where the main goals are to achieve low energy consumption and improved rotordynamic stability. A H-infinity optimal control synthesis procedure is defined for the permanent-magnet-biased AMB-rotor system with 4 degrees of freedom. Through the choice of design weighting functions, notch filter characteristics are incorporated within the controller to reduce AMB current components caused by rotor vibration at the synchronous frequency and higher harmonics. Experimental tests are used to validate the controller design methodology and provide comparative results on performance… More >

  • Open Access

    ARTICLE

    Optimization of Control Loops and Operating Parameters for Three-Phase Separators Used in Oilfield Central Processing Facilities

    Zhenfeng Li, Yaqiao Li*, Guangjun Wei

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.3, pp. 635-649, 2023, DOI:10.32604/fdmp.2022.020633

    Abstract In this study, the Stokes formula is used to analyze the separation effect of three-phase separators used in a Oilfield Central Processing Facility. The considered main influencing factors include (but are not limited to) the typical size of oil and water droplets, the residence time and temperature of fluid and the dosage of demulsifier. Using the “Specification for Oil and Gas Separators” as a basis, the control loops and operating parameters of each separator are optimized Considering the Halfaya Oilfield as a testbed, it is shown that the proposed approach can lead to good results in the production stage. More >

  • Open Access

    ARTICLE

    GRU-based Buzzer Ensemble for Abnormal Detection in Industrial Control Systems

    Hyo-Seok Kim1, Chang-Gyoon Lim2, Sang-Joon Lee3, Yong-Min Kim4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1749-1763, 2023, DOI:10.32604/cmc.2023.026708

    Abstract Recently, Industrial Control Systems (ICSs) have been changing from a closed environment to an open environment because of the expansion of digital transformation, smart factories, and Industrial Internet of Things (IIoT). Since security accidents that occur in ICSs can cause national confusion and human casualties, research on detecting abnormalities by using normal operation data learning is being actively conducted. The single technique proposed by existing studies does not detect abnormalities well or provide satisfactory results. In this paper, we propose a GRU-based Buzzer Ensemble for Abnormal Detection (GBE-AD) model for detecting anomalies in industrial control systems to ensure rapid response… More >

  • Open Access

    ARTICLE

    Improved Electro Search Algorithm with Intelligent Controller Control System: ESPID Algorithm

    Inayet Hakki Cizmeci1,*, Adem Alpaslan Altun2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2555-2572, 2023, DOI:10.32604/iasc.2023.028851

    Abstract Studies have established that hybrid models outperform single models. The particle swarm algorithm (PSO)-based PID (proportional-integral-derivative) controller control system is used in this study to determine the parameters that directly impact the speed and performance of the Electro Search (ESO) algorithm to obtain the global optimum point. ESPID algorithm was created by integrating this system with the ESO algorithm. The improved ESPID algorithm has been applied to 7 multi-modal benchmark test functions. The acquired results were compared to those derived using the ESO, PSO, Atom Search Optimization (ASO), and Vector Space Model (VSM) algorithms. As a consequence, it was determined… More >

Displaying 1-10 on page 1 of 50. Per Page