IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing 特邀社论:通过估计计算实现基于物联网的安全健康监测和跟踪
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-05-30 DOI: 10.1049/cps2.12094
Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng
{"title":"Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing","authors":"Rocco Zaccagnino,&nbsp;Arcangelo Castiglione,&nbsp;Marek R. Ogiela,&nbsp;Florin Pop,&nbsp;Weizhi Meng","doi":"10.1049/cps2.12094","DOIUrl":"https://doi.org/10.1049/cps2.12094","url":null,"abstract":"<p>Despite the substantial advancements in health technology, the COVID-19 pandemic has underscored the imperative of enhancing the resilience and efficiency of healthcare systems. Within this context, the Internet of Things (IoT) paradigm emerges as highly pertinent in healthcare services, facilitating enriched doctor-patient interaction while concurrently ameliorating healthcare expenditures. Wearable devices provide patients with personalised access to health-related data, empower physicians with more effective health monitoring capabilities, and enable hospitals to oversee medical equipment, personnel, and infection transmission dynamics. IoT devices, functioning as data aggregators, accumulate extensive datasets, furnishing valuable insights that augment decision-making prowess within healthcare settings. However, the exponential proliferation of IoT devices poses formidable challenges in processing this voluminous and diverse data and extracting actionable insights. Amid the manifold benefits of IoT integration in healthcare services, several hurdles persist, including paramount data security and privacy concerns. Real-time data transmission from IoT devices amplifies these concerns, compounding issues related to data overload and potential inaccuracies. This special issue endeavours to disseminate the latest advancements in IoT within healthcare services. The principal objective is to empower researchers to delve into key concepts conducive to IoT's practical, feasible, and robust integration in healthcare delivery, thereby ensuring expeditious, end-to-end, and dependable service provision to patients.</p><p>In this Special Issue, our attention has been directed towards a spectrum of topics of scientific interest, encompassing artificial intelligence and IoT-based healthcare methodologies tailored for pandemic disease management, the synergy between Cloud computing and IoT-based healthcare infrastructures, the intricacies of IoT-based healthcare networks, the application of IoT for personalised health monitoring, the utilisation of IoT for disease diagnosis, and related domains. This special issue aims to showcase the latest research in IoT-based health monitoring systems and estimated computing. The papers presented here will provide valuable insights and contribute to the ongoing efforts to mitigate the impact of pandemics on public health.</p><p>The papers selected for this Special Issue collectively demonstrate the progressive advancement of scientific inquiry into solutions for IoT-based Secure Health Monitoring and Tracking through Estimated Computing. The pursuit of synergy among disciplines such as Artificial Intelligence, IoT, and Cloud Computing to develop diagnostic systems for diseases and personalised health monitoring stands poised to emerge as a paramount ambition within the scientific community dedicated to advancing societal well-being and health. Thus, the overall submissions were of high quality, which marks the success ","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141304297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks SEIR 驱动的语义整合框架:利用递归神经网络在 COVID-19 疫情爆发中加强物联网流行病学监测
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-04-17 DOI: 10.1049/cps2.12091
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Shivam Goyal,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning model for Alzheimer's disease prediction 预测阿尔茨海默病的机器学习模型
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-03-20 DOI: 10.1049/cps2.12090
Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi
{"title":"A machine learning model for Alzheimer's disease prediction","authors":"Pooja Rani,&nbsp;Rohit Lamba,&nbsp;Ravi Kumar Sachdeva,&nbsp;Karan Kumar,&nbsp;Celestine Iwendi","doi":"10.1049/cps2.12090","DOIUrl":"10.1049/cps2.12090","url":null,"abstract":"<p>Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Internet of Medical Things with ECG-based PUF encryption 利用基于心电图的 PUF 加密技术确保医疗物联网的安全
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-03-08 DOI: 10.1049/cps2.12089
Biagio Boi, Christian Esposito
{"title":"Securing the Internet of Medical Things with ECG-based PUF encryption","authors":"Biagio Boi,&nbsp;Christian Esposito","doi":"10.1049/cps2.12089","DOIUrl":"10.1049/cps2.12089","url":null,"abstract":"<p>The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context 网络物理系统背景下数据驱动电池寿命预测的现状、挑战和前景
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-01-31 DOI: 10.1049/cps2.12086
Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan, Xin Li
{"title":"Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context","authors":"Yang Liu,&nbsp;Sihui Chen,&nbsp;Peiyi Li,&nbsp;Jiayu Wan,&nbsp;Xin Li","doi":"10.1049/cps2.12086","DOIUrl":"10.1049/cps2.12086","url":null,"abstract":"<p>Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140471755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104 用于监控和数据采集入侵检测系统的过采样和欠采样 IEC 60870-5-104
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-01-04 DOI: 10.1049/cps2.12085
M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto
{"title":"Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104","authors":"M. Agus Syamsul Arifin,&nbsp;Deris Stiawan,&nbsp;Bhakti Yudho Suprapto,&nbsp;Susanto Susanto,&nbsp;Tasmi Salim,&nbsp;Mohd Yazid Idris,&nbsp;Rahmat Budiarto","doi":"10.1049/cps2.12085","DOIUrl":"10.1049/cps2.12085","url":null,"abstract":"<p>Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning-based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870-5-104 (IEC 104) protocol on a testbed network is presented. The dataset includes normal and attacks traffic data such as port scan, brute force, and Denial of service attacks. Various types of Denial of service attacks are generated to create a robust and specific dataset for training the intrusion detection system model. Three popular techniques for handling class imbalance, that is, random over-sampling, random under-sampling, and synthetic minority oversampling, are implemented to select the best dataset for the experiment. Gradient boosting, decision tree, and random forest algorithms are used as classifiers for the intrusion detection system models. Experimental results indicate that the intrusion detection system model using decision tree and random forest classifiers using random under-sampling achieved the highest accuracy of 99.05%. The intrusion detection system model's performance is verified using various metrics such as recall, precision, F1-Score, receiver operating characteristics curves, and area under the curve. Additionally, 10-fold cross-validation shows no indication of overfitting in the created intrusion detection system model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique 利用优化的轻量级深度边缘智能技术移动检测白内障
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2024-01-01 DOI: 10.1049/cps2.12083
Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain
{"title":"Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique","authors":"Dipta Neogi,&nbsp;Mahirul Alam Chowdhury,&nbsp;Mst. Moriom Akter,&nbsp;Md. Ishan Arefin Hossain","doi":"10.1049/cps2.12083","DOIUrl":"10.1049/cps2.12083","url":null,"abstract":"<p>Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning the geometry of short-circuit faults in power systems for real-time fault detection and classification 学习电力系统短路故障的几何形状,实现实时故障检测和分类
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-12-04 DOI: 10.1049/cps2.12074
Juan Pablo Naranjo Cuéllar, Gustavo Ramos López, Luis Felipe Giraldo Trujillo
{"title":"Learning the geometry of short-circuit faults in power systems for real-time fault detection and classification","authors":"Juan Pablo Naranjo Cuéllar,&nbsp;Gustavo Ramos López,&nbsp;Luis Felipe Giraldo Trujillo","doi":"10.1049/cps2.12074","DOIUrl":"https://doi.org/10.1049/cps2.12074","url":null,"abstract":"<p>Given the short time intervals in which short-circuit faults occur in a power system, a certain time delay between the moment of a fault's inception in the system to the moment in which the fault is actually detected is introduced. In this small time margin, the high amplitudes of the fault current can deal significant damage to the power system. A technique to characterise different types of short circuit faults in a power system for real-time detection, namely AB, BC, CA, ABC, AG, BG and CG faults (and normal operation), is presented based on the geometry of the curve generated by the Clarke transform of the three-phase voltages of the power system. The process was conducted in real time using the <i>HIL402</i> system and a Raspberry Pi 3, and all programming done in the Python programming language. It was concluded that the tested types of faults can be accurately characterised using the eigenvalues and eigenvectors of the matrix that characterises an ellipse associated with each fault: eigenvalues can be used to determine the fault inception distance and eigenvectors can be used to determine the type of fault that occurred. Next, the design of a machine learning model was done based on the previously mentioned characterisation technique. The model was embedded into a Raspberry Pi 3, thus enabling fault detection and classification in a base power system in real time. Finally, the accuracy of the model was tested under different measurement conditions, yielding satisfactory results for a selected set of conditions and overcoming the shortcomings presented in the current research, which do not perform detection and classification in real time.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138578065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Optimisation, control and AI technology for digital and low-carbon power systems 特邀社论:数字和低碳电力系统的优化、控制和人工智能技术
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-12-03 DOI: 10.1049/cps2.12082
Pathmanathan Naidoo, Maria Cristina Tavares, Junwei Cao, Yi Ding, Haochen Hua
{"title":"Guest Editorial: Optimisation, control and AI technology for digital and low-carbon power systems","authors":"Pathmanathan Naidoo,&nbsp;Maria Cristina Tavares,&nbsp;Junwei Cao,&nbsp;Yi Ding,&nbsp;Haochen Hua","doi":"10.1049/cps2.12082","DOIUrl":"https://doi.org/10.1049/cps2.12082","url":null,"abstract":"<p>Modern power systems are facing a growing integration of distributed energy resources (DERs), mainly driven by energy transition, decarbonisation and economic benefits. The deployment of Internet of Things devices transforms the conventional power system into a digitised, cyber, intelligent one, which plays a significant role in grid control and operation and enables numerous smart-grid applications.</p><p>The stochastic nature of distributed renewable power generation poses challenges for a power systems operation, while coordinating the dispatch and control of various DERs to reduce operating costs and carbon emissions is essential to improve energy utilisation efficiency. Also, the large-scale connection of DERs increases the complexity of distribution networks, which require more advanced and efficient approaches for system analysis, fault diagnosis and operational optimisation. In this sense, smart monitoring and control systems can also be applied to transmission power networks, enhancing safety and robustness.</p><p>Energy internet technology has laid a solid foundation for data-driven analysis, allowing power systems to enter a ‘data-intensive’ era. Currently, huge amounts of data from various sources have been a driving force, enabling big data analytics and artificial intelligence on smart-grid applications, such as planning, operation, energy management, trading, system reliability and resiliency enhancement, system identification and monitoring, fault intelligent perception and diagnosis, and cyber and physical security.</p><p>This Special Issue publishes state-of-the-art works related to all aspects of theories and methodologies in optimisation, control and AI technology for digital and low-carbon power systems.</p><p>The stochastic nature of distributed renewable generation makes the operation of power systems face the challenge of uncertainty. Thereby, it is of great significance to monitor and identify the real-time state of the new power system. The paper, ‘The real-time state identification of the electricity-heat system based on borderline-SMOTE and XGBoost’ by X. Pei et al., proposes a state identification method based on multi-class data equalisation and extreme gradient boost for systems. The optimal hyperparameters of the model are obtained based on the K-fold cross-validation and grid search.</p><p>Reducing carbon emissions is one of the goals of modern power systems operation. Power generation by natural gas, compared with that by coal, has the characteristics of cleanness, efficiency and low carbon. This makes gas-fired power plants popular for undertaking peak regulation tasks in the power systems. The paper, ‘Key problems of gas-fired power plants participating in peak load regulation: a review’ by G. Wang et al., reviews the key problems faced by gas-fired power plants participating in peak load regulation. This paper provides suggestions for the coordinated development of electricity and carbon market in the futur","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138578182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal congestion management in network routers subject to constraints, disturbances, and noise using the model predictive control approach 利用模型预测控制方法优化受约束、干扰和噪声影响的网络路由器的拥塞管理
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-10-12 DOI: 10.1049/cps2.12081
Bijan Nasiri, Farhad Bayat, MohammadAli Mohammadkhani, Andrzej Bartoszewicz
{"title":"Optimal congestion management in network routers subject to constraints, disturbances, and noise using the model predictive control approach","authors":"Bijan Nasiri,&nbsp;Farhad Bayat,&nbsp;MohammadAli Mohammadkhani,&nbsp;Andrzej Bartoszewicz","doi":"10.1049/cps2.12081","DOIUrl":"10.1049/cps2.12081","url":null,"abstract":"<p>A predictive queue management method is proposed for constrained congestion control in internet routers in the face of communication delays. The proposed method uses the queue and router models, input traffic rate, and queue length to precisely characterise the entire process. The model that has been built is then used to construct an optimal constrained active queue management (CAQM) strategy using the model predictive control method. Important factors, such as link capacity, Transmission Control Protocol (TCP) sessions, round-trip time, and a few others, have been selected and used to linearise the interconnection of TCP. Then, an efficient MPC-based structure to manage the CAQM in the face of unknown disturbances is designed. Simulations are used to validate the proposed method's effectiveness and robustness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136014706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信