default search action
IET Cyber-Physical Systems: Theory & Applications, Volume 9
Volume 9, Number 1, March 2024
REVIEW
- Gang Lin, Christian Rehtanz, Shaoyang Wang, Jiayan Liu, Zhenyu Zhang, Pengcheng Wang:
Review on the key technologies of power grid cyber-physical systems simulation. 1-16
ORIGINAL RESEARCH
- Di Yang, Ming Ji, Yuntong Lv, Mengyu Li, Xuezhe Gao:
Power user portrait model based on random forest. 17-26 - Vahid Tahani, Mohammad Haddad Zarif, Hossein Gholizade-Narm:
A new stable scheme against false data injection attacks in distributed control microgrid. 27-40 - Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian:
Selective real-time adversarial perturbations against deep reinforcement learning agents. 41-49 - Yongzhen Guo, Li Li, Yuanqing Xia, Yanxin Wen, Jingjing Guo:
Distributed consensus-based estimation for non-linear systems subject to missing measurements and Denial of Service attacks. 50-62 - Yupeng Liu, Bofeng Yan, Jia Yu:
Multi objective task resource allocation method based on hierarchical Bayesian adaptive sparsity for edge computing in low voltage stations. 63-71 - Hossein Malekpour Naghneh, Maryamparisa Amani, Alireza Farhadi, Mohammad Taghi Isaai:
Application of the closed loop industrial internet of things (IIoT)-based control system in enhancing the oil recovery factor and the oil production. 72-86 - Li Ying, Zhao Lei, Geng Junwei, Hu Jinhui, Lei Ma, Zilong Zhao:
Unsafe behaviour detection with the improved YOLOv5 model. 87-98
Volume 9, Number 2, June 2024
GUEST EDITORIAL
- Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng:
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing. 99-101
ORIGINAL RESEARCH
- Tommaso Baldo, Mauro Migliardi:
SwarmAd: A decentralised content management system. 102-114 - Biagio Boi, Christian Esposito:
Securing the Internet of Medical Things with ECG-based PUF encryption. 115-124 - Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi:
A machine learning model for Alzheimer's disease prediction. 125-134 - Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui:
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks. 135-149
CASE STUDY
- Adrian Florea, Daniel-Ioan Popa, Daniel Morariu, Ionela Maniu, Lasse Berntzen, Ugo Fiore:
Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study. 150-168
REVIEW
- Katherine van Lopik, Steven Hayward, Rebecca Grant, Laura McGirr, Paul A. Goodall, Yan Jin, Mark Price, Andrew A. West, Paul P. Conway:
A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5. 169-183
ORIGINAL RESEARCH
- Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du:
A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers. 184-193 - Angxin Liu, Yongbiao Yang:
A multilevel segmentation method of asymmetric semantics based on deep learning. 194-205
Volume 9, Number 3, September 2024
Review
- Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan, Xin Li:
Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context. 207-217
Original Research
- Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo:
Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images. 218-227 - Hongwei Li, Danai Chasaki:
Detecting covert channel attacks on cyber-physical systems. 228-237 - Xiaoqing Mai, Tianhu Zhang, Changwu Hu, Yan Zhang:
Feature selection algorithm for substation main equipment defect text mining based on natural language processing. 238-246 - Zhao Liangfu, Yujie Xiong, Yongbin Gao, Wenjun Yu:
Multiple dependence representation of attention graph convolutional network relation extraction model. 247-257 - Bijan Nasiri, Farhad Bayat, MohammadAli Mohammadkhani, Andrzej Bartoszewicz:
Optimal congestion management in network routers subject to constraints, disturbances, and noise using the model predictive control approach. 258-268 - Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain:
Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique. 269-281 - M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto:
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104. 282-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.