Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Robust Control and Stabilization of Autonomous Vehicular Systems under Deception Attacks and Switching Signed Networks

    Muflih Alhazmi1, Waqar Ul Hassan2, Saba Shaheen3, Mohammed M. A. Almazah4, Azmat Ullah Khan Niazi3,*, Nafisa A. Albasheir5, Ameni Gargouri6, Naveed Iqbal7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1903-1940, 2025, DOI:10.32604/cmes.2025.072973 - 26 November 2025

    Abstract This paper proposes a model-based control framework for vehicle platooning systems with second-order nonlinear dynamics operating over switching signed networks, time-varying delays, and deception attacks. The study includes two configurations: a leaderless structure using Finite-Time Non-Singular Terminal Bipartite Consensus (FNTBC) and Fixed-Time Bipartite Consensus (FXTBC), and a leader—follower structure ensuring structural balance and robustness against deceptive signals. In the leaderless model, a bipartite controller based on impulsive control theory, gauge transformation, and Markovian switching Lyapunov functions ensures mean-square stability and coordination under deception attacks and communication delays. The FNTBC achieves finite-time convergence depending on initial More >

  • Open Access

    ARTICLE

    Deep Learning-Based Health Assessment Method for Benzene-to-Ethylene Ratio Control Systems under Incomplete Data

    Huichao Cao1,*, Honghe Du1, Dongnian Jiang1, Wei Li1, Lei Du1, Jianfeng Yang2

    Structural Durability & Health Monitoring, Vol.19, No.5, pp. 1305-1325, 2025, DOI:10.32604/sdhm.2025.066002 - 05 September 2025

    Abstract In the production processes of modern industry, accurate assessment of the system’s health state and traceability non-optimal factors are key to ensuring “safe, stable, long-term, full load and optimal” operation of the production process. The benzene-to-ethylene ratio control system is a complex system based on an MPC-PID double-layer architecture. Taking into consideration the interaction between levels, coupling between loops and conditions of incomplete operation data, this paper proposes a health assessment method for the dual-layer control system by comprehensively utilizing deep learning technology. Firstly, according to the results of the pre-assessment of the system layers… More >

  • Open Access

    REVIEW

    Collision-Free Satellite Constellations: A Comprehensive Review on Autonomous and Collaborative Algorithms

    Ghulam E Mustafa Abro1,*, Altaf Mugheri2,#, Zain Anwar Ali3,#

    Revue Internationale de Géomatique, Vol.34, pp. 301-331, 2025, DOI:10.32604/rig.2025.065595 - 05 June 2025

    Abstract Swarm intelligence, derived from the collective behaviour of biological entities, is a novel methodology for overseeing satellite constellations within decentralized control systems. Conventional centralized control systems in satellite constellations encounter constraints in scalability, resilience, and fault tolerance, particularly in extensive constellations. This research examines the use of swarm-based multi-agent systems and distributed algorithms for efficient communication, collision avoidance, and collaborative task execution in satellite constellations. We provide a comprehensive study of current swarm control algorithms, their relevance to satellite systems, and identify areas requiring further research. Principal subjects encompass decentralized decision-making, self-organization, adaptive communication protocols, More >

  • Open Access

    ARTICLE

    Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems

    Peiying Zhang1,2,*, Yihong Yu1,2, Jing Liu3, Chong Lv1,2, Lizhuang Tan4,5, Yulin Zhang6,7,8

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4393-4409, 2025, DOI:10.32604/cmc.2025.064654 - 19 May 2025

    Abstract As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facilitating data-driven decision making, fostering innovation ecosystems, and maintaining operational stability. In this study, we propose an advanced deployment algorithm for Service Function Chaining (SFC) that leverages an enhanced Practical Byzantine Fault Tolerance (PBFT) mechanism. The main goal is to tackle the issues of security and resource efficiency in SFC implementation across diverse network settings. By integrating blockchain technology and Deep Reinforcement Learning (DRL), our algorithm not… More >

  • Open Access

    ARTICLE

    Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)

    Hariharan Ramachandran1,*, Richard Smith2, Kenny Awuson David1,*, Tawfik Al-Hadhrami3, Parag Acharya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3619-3641, 2025, DOI:10.32604/cmc.2024.054802 - 17 February 2025

    Abstract This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios… More >

  • Open Access

    ARTICLE

    Programmable Logic Controller Block Monitoring System for Memory Attack Defense in Industrial Control Systems

    Mingyu Lee1, Jiho Shin2, Jung Taek Seo3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2427-2442, 2023, DOI:10.32604/cmc.2023.041774 - 29 November 2023

    Abstract Cyberattacks targeting industrial control systems (ICS) are becoming more sophisticated and advanced than in the past. A programmable logic controller (PLC), a core component of ICS, controls and monitors sensors and actuators in the field. However, PLC has memory attack threats such as program injection and manipulation, which has long been a major target for attackers, and it is important to detect these attacks for ICS security. To detect PLC memory attacks, a security system is required to acquire and monitor PLC memory directly. In addition, the performance impact of the security system on the… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475 - 31 October 2023

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst… More >

  • Open Access

    ARTICLE

    Control System Design for Low Power Magnetic Bearings in a Flywheel Energy Storage System

    Tinnawat Hongphan1, Matthew O. T. Cole1,*, Chakkapong Chamroon1, Ziv Brand2

    Energy Engineering, Vol.120, No.1, pp. 147-161, 2023, DOI:10.32604/ee.2022.022821 - 27 October 2022

    Abstract This paper presents a theoretical and experimental study on controller design for the AMBs in a small-scale flywheel energy storage system, where the main goals are to achieve low energy consumption and improved rotordynamic stability. A H-infinity optimal control synthesis procedure is defined for the permanent-magnet-biased AMB-rotor system with 4 degrees of freedom. Through the choice of design weighting functions, notch filter characteristics are incorporated within the controller to reduce AMB current components caused by rotor vibration at the synchronous frequency and higher harmonics. Experimental tests are used to validate the controller design methodology and More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712 - 01 August 2022

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283 - 18 May 2022

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and… More >

Displaying 1-10 on page 1 of 22. Per Page