Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Temperature measurement
biblio
Demagnetization Modeling Research for Permanent Magnet in PMSLM Using Extreme Learning Machine
Submitted by aekwall on Mon, 02/24/2020 - 10:54am
permanent magnets (PM)
Fitting
linear modeling method
linear synchronous motors
machine theory
magnetic distribution
permanent magnet motors
permanent magnet synchronous linear motor
permanent magnet synchronous linear motor (PMSLM)
extreme learning machine (ELM)
PM characteristics
PMSLM
polynomial modeling method
temperature 293.0 K to 298.0 K
temperature 300.0 degC
temperature demagnetization modeling method
Temperature distribution
Data models
extreme learning machine
ELM
Demagnetization
Permanent magnets
demagnetisation
finite element analysis
remanence
Compositionality
polynomials
Temperature measurement
power engineering computing
machine learning algorithm
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 2:21pm
security of data
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
Monitoring
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
embedded security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
artificial intelligence security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
biblio
Modeling the Role of the Buildup of Magnetic Charges in Low Anisotropy Polycrystalline Materials
Submitted by aekwall on Mon, 09/30/2019 - 10:08am
remanence
Magnetometers
negative-field cooling
Perpendicular magnetic anisotropy
phenomenological energy barriers
polycrystalline gadolinium
polymer structure
positive-field warming
pubcrawl
magnetocaloric effects
remnant magnetization
Soft magnetic materials
soft-magnetic materials
Stoner-Wohlfarth-type model
Stoner–Wohlfarth model
susceptibility
Temperature measurement
thermal relaxation
gadolinium
Resiliency
Compositionality
Internet of Things
cyber physical systems
Anisotropic magnetoresistance
anisotropy field
composability
demagnetisation
Magnetic Remanence
grain boundaries
low anisotropy polycrystalline materials
Magnetic anisotropy
magnetic charges
magnetic susceptibility
Magnetization
magneto-thermal characteristics
biblio
Repurposing SoC Analog Circuitry for Additional COTS Hardware Security
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
repurposing SoC analog circuitry
Microelectronics Security
on-chip analog blocks
on-chip analog hardware blocks
physically unclonable function responses
processing algorithms
pubcrawl
PUF responses
reliable key generation
microcontrollers
resilience
Resiliency
security
Semiconductor device measurement
system-on-chip
temperature fluctuations
Temperature measurement
trusted microelectronics
Cryptography
additional COTS hardware security
analog to digital converters
analogue-digital conversion
commercial off-the-shelf system-on-a-chip integrated circuits
common COTS microcontroller
comparators
composability
COTS security
ADC
DAC
device authentication activities
digital to analog converters
digital-analogue conversion
encryption
Hardware
Hardware Security
Metrics
biblio
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
security
lightweight monitoring system
malicious data-integrity attacks
malicious nodes
Metrics
Monitoring
network attacks
networked system
pubcrawl
resilience
Resiliency
IoT security
security of data
sensor correlations
Silicon
telecommunication security
Temperature measurement
Temperature sensors
Wireless Sensor Network
wireless sensor networks
WSNs
ECA rule-based wireless sensor networks
abnormal-node detection
abnormality thresholds
Correlation
data integrity
data integrity attack
data-integrity detection
dependability
dependable monitoring system
distributed system
abnormal nodes
ECA rules
embedded sensor devices
event-condition-action rule
failure handling
Fuzzy logic
heterogeneous sensor readings
hierarchical abnormal-node detection
hierarchical framework
Internet of Things
biblio
Security system based on microcontrollers
Submitted by aekwall on Mon, 03/25/2019 - 9:57am
security system
Local area networks
magnetic contact
Magnetic field measurement
magnetic sensors
microcontroller
microsensors
movement detection measurement
process control
level measurement
sensor modules
single-chip microcontrollers
Smart Home
Temperature measurement
unauthorized entrance detection
Web server implementation
Web servers
sensor security
microcontrollers
Monitoring
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Temperature sensors
security
carbon monoxide level measurement
computerised instrumentation
development board Arduino
Ethernet interface
file servers
humidity measurement
Intelligent sensors
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
biblio
Big Data Analytics for Air Quality Monitoring at a Logistics Shipping Base via Autonomous Wireless Sensor Network Technologies
Submitted by grigby1 on Mon, 12/03/2018 - 1:52pm
Temperature measurement
indoor air quality
industrial workplace air quality
industrial workplace buildings
industrial workplaces
logistics shipping base
Monitoring
on-shore logistics base a regional shipping industry
oxygen displacer
perceived levels
potential BD problems
reported medical health
shipping industry
Humidity
Temperature sensors
Transportation
visualization approach
Wireless Sensor Network Technologies
wireless sensor networks
workplace environments
WSN technologies
pubcrawl
Metrics
Resiliency
Scalability
CO2
supply chain risk assessment
Logistics
Big Data
resilience
air quality
air quality monitoring
air temperature
autonomous assessment
autonomous wireless sensor network technologies
Big Data Analytics
Buildings
Carbon dioxide
supply chain management
confined spaces humans
continuous assessment
critical role
data analytics approach
Decision Making
effective decision making
Employment
ergonomics
health and safety
Heart rate
high risk industries
biblio
A graph-based trust-enhanced recommender system for service selection in IOT
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
IoT
Trusted Computing
trust
Temperature measurement
Social network services
Social Internet of Things
service selection problem
security of data
reliable service
recommender systems
pubcrawl
collaboration
Internet of Things
Human Factors
Human behavior
graph-based trust-enhanced recommender system
graph theory
control systems
computer theory
collaborative filtering recommendation algorithm
collaborative filtering
« first
‹ previous
1
2
3
4
5
next ›
last »