首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
SmartWeed: An Autonomous Rover System for Real-Time Weed Detection and Classification in Agricultural Fields 智能杂草:一种用于农业领域实时杂草检测和分类的自动漫游车系统
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-24 DOI: 10.1049/cps2.70039
Md Shahriar Hossain Apu, Suman Saha

Weeds are a significant challenge to crop quality and quantity and therefore there is a need to adopt effective weed control and management systems. Nowadays, object detection has found extensive applications in the agricultural field such as the detection of weeds through deep learning, machine learning, image processing and IoT. The idea in this paper is to present the proposal of an autonomous rover that can identify and classify weeds in real time using the YOLO object detection method. The dataset that will be utilised in the current research is a collection of 5997 images of weed instances, allowing even more accurate detection and classification of weeds. We also combined the Convolutional Block Attention Module (CBAM) with YOLO to enable the model to pay attention to the useful spatial and channel-wise features, as an evaluation of the performance of various YOLO models is based on inference time and weed detection accuracy. Based on the experiment, YOLOv8 and its variant YOLOv8-X demonstrated the best mean average precision (mAP) of 93.6% with that inference times of 3.4 and 2.2 ms per image, respectively. YOLOv9-E (an extension of YOLOv9) using CBAM, on the other hand, had better mAP of 99.5% with inference times of 10.6 and 2.5 ms, respectively. These findings indicate that YOLOv8 and YOLOv9 hold a good prospective of automatic field-level weed detection and emphasise the significance of high-quality datasets, efficient model architectures and attention mechanisms to the efficient and correct autonomous weed management.

杂草是农作物质量和数量的重大挑战,因此需要采用有效的杂草控制和管理系统。如今,通过深度学习、机器学习、图像处理和物联网等手段,目标检测在农业领域得到了广泛的应用。本文的思想是提出一种利用YOLO目标检测方法对杂草进行实时识别和分类的自主漫游车。在当前的研究中使用的数据集是5997张杂草实例图像的集合,可以更准确地检测和分类杂草。我们还将卷积块注意模块(CBAM)与YOLO结合起来,使模型能够关注有用的空间和信道特征,因为各种YOLO模型的性能评估是基于推理时间和杂草检测精度的。实验表明,YOLOv8及其变体YOLOv8- x的最佳平均精度(mAP)为93.6%,每张图像的推理时间分别为3.4 ms和2.2 ms。另一方面,使用CBAM的YOLOv9- e (YOLOv9的扩展)的mAP值为99.5%,推断时间分别为10.6 ms和2.5 ms。这些结果表明,YOLOv8和YOLOv9在田间杂草自动检测方面具有良好的应用前景,并强调了高质量的数据集、高效的模型架构和关注机制对高效、正确的自主杂草管理的重要性。
{"title":"SmartWeed: An Autonomous Rover System for Real-Time Weed Detection and Classification in Agricultural Fields","authors":"Md Shahriar Hossain Apu,&nbsp;Suman Saha","doi":"10.1049/cps2.70039","DOIUrl":"https://doi.org/10.1049/cps2.70039","url":null,"abstract":"<p>Weeds are a significant challenge to crop quality and quantity and therefore there is a need to adopt effective weed control and management systems. Nowadays, object detection has found extensive applications in the agricultural field such as the detection of weeds through deep learning, machine learning, image processing and IoT. The idea in this paper is to present the proposal of an autonomous rover that can identify and classify weeds in real time using the YOLO object detection method. The dataset that will be utilised in the current research is a collection of 5997 images of weed instances, allowing even more accurate detection and classification of weeds. We also combined the Convolutional Block Attention Module (CBAM) with YOLO to enable the model to pay attention to the useful spatial and channel-wise features, as an evaluation of the performance of various YOLO models is based on inference time and weed detection accuracy. Based on the experiment, YOLOv8 and its variant YOLOv8-X demonstrated the best mean average precision (mAP) of 93.6% with that inference times of 3.4 and 2.2 ms per image, respectively. YOLOv9-E (an extension of YOLOv9) using CBAM, on the other hand, had better mAP of 99.5% with inference times of 10.6 and 2.5 ms, respectively. These findings indicate that YOLOv8 and YOLOv9 hold a good prospective of automatic field-level weed detection and emphasise the significance of high-quality datasets, efficient model architectures and attention mechanisms to the efficient and correct autonomous weed management.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Modelling and Analysis of Cyber-Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets 基于广义随机Petri网的网络物理系统抗DoS攻击增强建模与分析
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-21 DOI: 10.1049/cps2.70036
Mahdi Jafarpour, M. Sami Fadali

This paper proposes a new framework for the analysis of cyber-physical system security against denial-of-service (DoS) attacks using generalised stochastic Petri nets. Although cyber-physical systems, through increased integration of computational and physical processes, offer great advantages, they are subject to cyber threats that can disrupt their critical operations. Among them, DoS attacks, which overload communication channels and prohibit the exchange of data between system components, are a major concern. Traditional methods of security assessment are inadequate given the unique complexities of cyber-physical system architectures. This research presents a generalised stochastic Petri net-based model able to capture the dynamics of a cyber-physical system under attack scenarios for the comprehensive analysis of system vulnerabilities and defencive mechanisms. The model incorporates immediate and timed transitions, thus mapping both continuous operations of the cyber-physical system and the discrete-event nature of cyber threats. Simulation experiments validate the effectiveness of the model in demonstrating how DoS attacks can degrade system performance. The results reflect the need for improved methodologies for security testing in order to enhance the resilience of cyber-physical systems, particularly in safety-critical applications.

本文提出了一种利用广义随机Petri网分析网络物理系统抗拒绝服务(DoS)攻击的新框架。虽然网络物理系统通过增加计算和物理过程的集成,提供了巨大的优势,但它们受到网络威胁,可能会破坏其关键操作。其中,DoS攻击使通信通道过载,禁止系统组件之间的数据交换,是一个主要问题。考虑到网络物理系统架构的独特复杂性,传统的安全评估方法是不够的。本研究提出了一种基于广义随机Petri网的模型,该模型能够捕捉攻击场景下网络物理系统的动态,用于全面分析系统漏洞和防御机制。该模型结合了即时和定时转换,从而映射了网络物理系统的连续操作和网络威胁的离散事件性质。仿真实验验证了该模型在演示DoS攻击如何降低系统性能方面的有效性。结果反映了改进安全测试方法的必要性,以增强网络物理系统的弹性,特别是在安全关键应用中。
{"title":"Enhanced Modelling and Analysis of Cyber-Physical System Security Against DoS Attacks Using Generalised Stochastic Petri Nets","authors":"Mahdi Jafarpour,&nbsp;M. Sami Fadali","doi":"10.1049/cps2.70036","DOIUrl":"https://doi.org/10.1049/cps2.70036","url":null,"abstract":"<p>This paper proposes a new framework for the analysis of cyber-physical system security against denial-of-service (DoS) attacks using generalised stochastic Petri nets. Although cyber-physical systems, through increased integration of computational and physical processes, offer great advantages, they are subject to cyber threats that can disrupt their critical operations. Among them, DoS attacks, which overload communication channels and prohibit the exchange of data between system components, are a major concern. Traditional methods of security assessment are inadequate given the unique complexities of cyber-physical system architectures. This research presents a generalised stochastic Petri net-based model able to capture the dynamics of a cyber-physical system under attack scenarios for the comprehensive analysis of system vulnerabilities and defencive mechanisms. The model incorporates immediate and timed transitions, thus mapping both continuous operations of the cyber-physical system and the discrete-event nature of cyber threats. Simulation experiments validate the effectiveness of the model in demonstrating how DoS attacks can degrade system performance. The results reflect the need for improved methodologies for security testing in order to enhance the resilience of cyber-physical systems, particularly in safety-critical applications.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146096488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time- and Behaviour-Preserving Execution of Determinate Supervisory Control 保留时间和行为的确定监督控制的执行
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-11 DOI: 10.1049/cps2.70038
Alireza Mohamadkhani, Marc Geilen, Jeroen Voeten, Twan Basten

Behaviours and activities are natural concepts (found, e.g., in UML and SysML) for model-driven design of cyber-physical systems (CPS). These concepts are formalised in the activity framework, a model-based framework incorporating a model of activities with determinate timing and behaviour, and a strong mathematical foundation based on max-plus algebra that allows efficient timing analysis and optimisation. It provides a layered view of the system's actions and events, activities built from them, and sequences of activities that capture the overall behaviour of the system. Implementations of supervisory control for CPS to govern the system behaviour are often made by hand. Preserving the specified behaviour and the model-predicted timing in an implementation is challenging, due to the need to simultaneously handle action timing, synchronisation, concurrency, pipelining and plant feedback. We introduce an execution architecture and engine to automatically synthesise an implementation of a supervisory controller directly from a model specification. The execution engine is guaranteed to execute a specification in a time- and behaviour-preserving fashion, even in the presence of action timing variations and including event feedback in a physical execution. We prove that the architecture and engine preserve the specified ordering of actions and events of the model as well as the timing thereof, up to a known bound. We validate our approach on a prototype production system.

行为和活动是网络物理系统(CPS)模型驱动设计的自然概念(例如,在UML和SysML中可以找到)。这些概念在活动框架中形式化,这是一个基于模型的框架,包含具有确定时间和行为的活动模型,以及基于max-plus代数的强大数学基础,可以进行有效的时间分析和优化。它提供了系统的动作和事件、从它们构建的活动以及捕获系统整体行为的活动序列的分层视图。对CPS进行监督控制以管理系统行为的实现通常是手工完成的。在实现中保留指定的行为和模型预测的时间是具有挑战性的,因为需要同时处理动作时间、同步、并发、流水线和植物反馈。我们引入了一个执行架构和引擎,直接从模型规范中自动合成监控控制器的实现。执行引擎保证以保持时间和行为的方式执行规范,即使在存在动作时间变化和在物理执行中包含事件反馈的情况下也是如此。我们证明了体系结构和引擎保持了模型的动作和事件的指定顺序以及它们的时间,直到一个已知的界限。我们在原型生产系统上验证了我们的方法。
{"title":"Time- and Behaviour-Preserving Execution of Determinate Supervisory Control","authors":"Alireza Mohamadkhani,&nbsp;Marc Geilen,&nbsp;Jeroen Voeten,&nbsp;Twan Basten","doi":"10.1049/cps2.70038","DOIUrl":"https://doi.org/10.1049/cps2.70038","url":null,"abstract":"<p>Behaviours and activities are natural concepts (found, e.g., in UML and SysML) for model-driven design of cyber-physical systems (CPS). These concepts are formalised in the <i>activity framework</i>, a model-based framework incorporating a model of activities with determinate timing and behaviour, and a strong mathematical foundation based on max-plus algebra that allows efficient timing analysis and optimisation. It provides a layered view of the system's actions and events, activities built from them, and sequences of activities that capture the overall behaviour of the system. Implementations of supervisory control for CPS to govern the system behaviour are often made by hand. Preserving the specified behaviour and the model-predicted timing in an implementation is challenging, due to the need to simultaneously handle <i>action timing, synchronisation, concurrency, pipelining</i> and <i>plant feedback</i>. We introduce an execution architecture and engine to automatically synthesise an implementation of a supervisory controller directly from a model specification. The execution engine is guaranteed to execute a specification in a time- and behaviour-preserving fashion, even in the presence of action timing variations and including event feedback in a physical execution. We prove that the architecture and engine preserve the specified ordering of actions and events of the model as well as the timing thereof, up to a known bound. We validate our approach on a prototype production system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70038","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145964282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques ICS的守护者:异常检测技术的比较分析
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-05 DOI: 10.1049/cps2.70037
Zequn Wang, Muhammad Azmi Umer, Haibo Zhang, Naveed ul Hassan, Chuadhry Mujeeb Ahmed

The security of industrial control systems (ICSs) is crucial due to their integral role in critical national infrastructure. This study tackles the escalating challenges posed by sophisticated cyberattacks, especially those that are unknown and evade existing detection mechanisms. Despite extensive research, there is a notable gap in systematically comparing supervised and unsupervised learning models for anomaly detection, leading to inconsistent evaluations of their effectiveness. To bridge this gap, we developed a comprehensive anomaly detection framework to systematically evaluate these models, focusing on their capability to detect unknown attacks. Utilising operational data from the Secure Water Treatment (SWaT) testbed, we assessed six unsupervised and five supervised learning methods. Our findings reveal significant performance disparities: supervised models excel in precision but have higher undetected rates, whereas unsupervised models achieve superior recall at the expense of increased false alarm rates. This study provides critical insights into the strengths and limitations of both approaches, guiding the development of more robust ICS security solutions.

工业控制系统(ics)的安全至关重要,因为它们在关键的国家基础设施中起着不可或缺的作用。本研究解决了复杂网络攻击带来的不断升级的挑战,特别是那些未知的和逃避现有检测机制的网络攻击。尽管进行了广泛的研究,但在系统地比较有监督和无监督学习模型用于异常检测方面存在明显的差距,导致对其有效性的评估不一致。为了弥补这一差距,我们开发了一个全面的异常检测框架来系统地评估这些模型,重点关注它们检测未知攻击的能力。利用安全水处理(SWaT)试验台的运行数据,我们评估了六种无监督学习方法和五种有监督学习方法。我们的研究结果揭示了显著的性能差异:监督模型在精度方面表现出色,但未检测到的率更高,而非监督模型以增加误报率为代价获得了更高的召回率。本研究提供了对这两种方法的优势和局限性的关键见解,指导更强大的ICS安全解决方案的开发。
{"title":"Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques","authors":"Zequn Wang,&nbsp;Muhammad Azmi Umer,&nbsp;Haibo Zhang,&nbsp;Naveed ul Hassan,&nbsp;Chuadhry Mujeeb Ahmed","doi":"10.1049/cps2.70037","DOIUrl":"https://doi.org/10.1049/cps2.70037","url":null,"abstract":"<p>The security of industrial control systems (ICSs) is crucial due to their integral role in critical national infrastructure. This study tackles the escalating challenges posed by sophisticated cyberattacks, especially those that are unknown and evade existing detection mechanisms. Despite extensive research, there is a notable gap in systematically comparing supervised and unsupervised learning models for anomaly detection, leading to inconsistent evaluations of their effectiveness. To bridge this gap, we developed a comprehensive anomaly detection framework to systematically evaluate these models, focusing on their capability to detect unknown attacks. Utilising operational data from the Secure Water Treatment (SWaT) testbed, we assessed six unsupervised and five supervised learning methods. Our findings reveal significant performance disparities: supervised models excel in precision but have higher undetected rates, whereas unsupervised models achieve superior recall at the expense of increased false alarm rates. This study provides critical insights into the strengths and limitations of both approaches, guiding the development of more robust ICS security solutions.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145904897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Early Stage Failure Prediction Mechanism in Smart Grid Networks 智能电网早期故障预测机制研究
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-03 DOI: 10.1049/cps2.70035
Ali Salehpour, Irfan Al-Anbagi, Kin-Choong Yow, Xiaolin Cheng

Smart grid systems, as modern cyber-physical systems (CPS), introduce new interdependencies between power and communication components that can create new security challenges. One potential challenge that may arise is cascading failures resulting from cyber-attacks or the failure of a component that needs to be detected in a timely manner. In this paper, we propose a novel early-stage failure prediction (ESFP) mechanism that applies machine learning (ML) algorithms to enhance the security of smart grid systems. We use a realistic model to generate a dataset for training ML algorithms and develop a mechanism to predict the state of a system's components in the early stages before failures propagate in the system. ESFP can predict the final state of each power system component with respect to its initial failures. We apply the extreme gradient boosting (XGBoost) algorithm and examine the features of both the communication and power networks that provide high accuracy in predicting failures. We develop a new data generation procedure to construct a dataset containing electrical and network features and characteristics for training ML algorithms. ESFP also identifies the location of the initial failures as this allows for further protection plans and decisions. We evaluate the effectiveness of the proposed mechanism through an analysis conducted on an IEEE 118-bus system. The proposed mechanism achieves 99.4% prediction accuracy in random attacks using the XGBoost algorithm. We also improve the time of the XGBoost algorithm by 75% by combining an unsupervised ML algorithm with this algorithm.

智能电网系统作为现代网络物理系统(CPS),在电力和通信组件之间引入了新的相互依赖关系,这可能会带来新的安全挑战。可能出现的一个潜在挑战是网络攻击导致的级联故障或需要及时检测的组件故障。在本文中,我们提出了一种新的早期故障预测(ESFP)机制,该机制应用机器学习(ML)算法来增强智能电网系统的安全性。我们使用现实模型来生成用于训练ML算法的数据集,并开发一种机制来预测系统组件在故障在系统中传播之前的早期阶段的状态。ESFP可以根据初始故障预测电力系统各部件的最终状态。我们应用了极端梯度增强(XGBoost)算法,并检查了通信和电力网络的特征,这些特征在预测故障方面提供了高精度。我们开发了一个新的数据生成过程来构建一个包含电气和网络特征和特征的数据集,用于训练ML算法。ESFP还可以识别初始故障的位置,从而为进一步的保护计划和决策提供依据。我们通过对IEEE 118总线系统的分析来评估所提出机制的有效性。该机制使用XGBoost算法对随机攻击的预测准确率达到99.4%。我们还通过将无监督ML算法与该算法相结合,将XGBoost算法的时间提高了75%。
{"title":"An Early Stage Failure Prediction Mechanism in Smart Grid Networks","authors":"Ali Salehpour,&nbsp;Irfan Al-Anbagi,&nbsp;Kin-Choong Yow,&nbsp;Xiaolin Cheng","doi":"10.1049/cps2.70035","DOIUrl":"10.1049/cps2.70035","url":null,"abstract":"<p>Smart grid systems, as modern cyber-physical systems (CPS), introduce new interdependencies between power and communication components that can create new security challenges. One potential challenge that may arise is cascading failures resulting from cyber-attacks or the failure of a component that needs to be detected in a timely manner. In this paper, we propose a novel early-stage failure prediction (ESFP) mechanism that applies machine learning (ML) algorithms to enhance the security of smart grid systems. We use a realistic model to generate a dataset for training ML algorithms and develop a mechanism to predict the state of a system's components in the early stages before failures propagate in the system. ESFP can predict the final state of each power system component with respect to its initial failures. We apply the extreme gradient boosting (XGBoost) algorithm and examine the features of both the communication and power networks that provide high accuracy in predicting failures. We develop a new data generation procedure to construct a dataset containing electrical and network features and characteristics for training ML algorithms. ESFP also identifies the location of the initial failures as this allows for further protection plans and decisions. We evaluate the effectiveness of the proposed mechanism through an analysis conducted on an IEEE 118-bus system. The proposed mechanism achieves 99.4% prediction accuracy in random attacks using the XGBoost algorithm. We also improve the time of the XGBoost algorithm by 75% by combining an unsupervised ML algorithm with this algorithm.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145686392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronisation, Optimisation and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis 计算机视觉在信息物理系统中的机器学习技术的同步、优化和适应:综合分析
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-17 DOI: 10.1049/cps2.70031
Kai Hung Tang, Mohamed Chahine Ghanem, Pawel Gasiorowski, Vassil Vassilev, Karim Ouazzane

Cyber-physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real-world conditions in real time. By bridging the digital and physical worlds, CPS ensures operations that are efficient, safe, innovative and controllable. As smart cities and autonomous machines become more prevalent, understanding CPS is crucial for driving future progress. Recent advancements in edge computing, AI-driven vision and collaborative systems have significantly enhanced CPS capabilities. Synchronisation, optimisation and adaptation are intricate processes that impact CPS performance across different domains. Therefore, identifying emerging trends and uncovering research gaps is essential to highlight areas that require further investigation and improvement. This systematic review and analysis aims to offer a unique point to researchers and facilitates this process by allowing researchers to benchmark and compare various techniques, evaluate their effectiveness and establish best practices. It provides evidence-based insights into optimal strategies for implementation while addressing potential trade-offs in performance, resource usage and reliability. Additionally, such reviews help identify widely accepted standards and frameworks, contributing to the development of standardised approaches.

网络物理系统(CPS)将计算机、网络和物理设备无缝集成,使机器能够实时通信、处理数据并响应现实世界的条件。通过连接数字世界和物理世界,CPS确保了高效、安全、创新和可控的运营。随着智能城市和自动机器变得越来越普遍,理解CPS对于推动未来的进步至关重要。边缘计算、人工智能驱动的视觉和协作系统的最新进展大大增强了CPS的能力。同步、优化和适应是影响不同领域CPS性能的复杂过程。因此,识别新趋势和发现研究差距对于突出需要进一步调查和改进的领域至关重要。这种系统的回顾和分析旨在为研究人员提供一个独特的观点,并通过允许研究人员对各种技术进行基准和比较,评估其有效性并建立最佳实践来促进这一过程。它为实现最佳策略提供了基于证据的见解,同时解决了性能、资源使用和可靠性方面的潜在权衡。此外,这种审查有助于确定广泛接受的标准和框架,有助于标准化方法的开发。
{"title":"Synchronisation, Optimisation and Adaptation of Machine Learning Techniques for Computer Vision in Cyber-Physical Systems: A Comprehensive Analysis","authors":"Kai Hung Tang,&nbsp;Mohamed Chahine Ghanem,&nbsp;Pawel Gasiorowski,&nbsp;Vassil Vassilev,&nbsp;Karim Ouazzane","doi":"10.1049/cps2.70031","DOIUrl":"https://doi.org/10.1049/cps2.70031","url":null,"abstract":"<p>Cyber-physical systems (CPS) seamlessly integrate computers, networks and physical devices, enabling machines to communicate, process data and respond to real-world conditions in real time. By bridging the digital and physical worlds, CPS ensures operations that are efficient, safe, innovative and controllable. As smart cities and autonomous machines become more prevalent, understanding CPS is crucial for driving future progress. Recent advancements in edge computing, AI-driven vision and collaborative systems have significantly enhanced CPS capabilities. Synchronisation, optimisation and adaptation are intricate processes that impact CPS performance across different domains. Therefore, identifying emerging trends and uncovering research gaps is essential to highlight areas that require further investigation and improvement. This systematic review and analysis aims to offer a unique point to researchers and facilitates this process by allowing researchers to benchmark and compare various techniques, evaluate their effectiveness and establish best practices. It provides evidence-based insights into optimal strategies for implementation while addressing potential trade-offs in performance, resource usage and reliability. Additionally, such reviews help identify widely accepted standards and frameworks, contributing to the development of standardised approaches.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Independent Task Scheduling in Multi-Core Systems: A Hardware-Based Approach for Optimising Energy and Thermal Efficiency 多核系统中的独立任务调度:一种基于硬件的优化能源和热效率的方法
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-17 DOI: 10.1049/cps2.70034
Mohammadreza Saberikia, Hakem Beitollahi, Hamed Farbeh

Task scheduling in real-time multi-core systems is crucial for meeting stringent timing requirements, especially as embedded systems become increasingly prevalent. Battery-powered systems, in particular, require energy-efficient schedulers to regulate processor speed and temperature. Current software-based schedulers face limitations, such as overhead, latency and inefficiencies, making it challenging to balance performance with energy and thermal management. This highlights the need for more dynamic schedulers in heterogeneous multi-core processor environments, particularly for independent task scheduling, which must address these challenges while optimising both energy consumption and temperature control. This paper presents an online distributed hardware scheduler designed specifically for independent tasks, utilising the earliest deadline first (EDF) algorithm to manage hard real-time tasks on multi-core embedded systems. Implementing this scheduler in hardware reduces clock cycles, improves efficiency and lowers latency compared to software-based solutions. It dynamically adapts to real-time tasks without compromising predictability or introducing significant overhead. The scheduler optimises energy consumption and temperature management, addressing both dynamic and static energy demands. Results show a reduction of 51.16% $51.16%$ in dynamic energy, 50.82% $50.82%$ in static energy and 20.21% $20.21%$ in temperature compared to the high-performance real-time hardware scheduler (HRHS), while maintaining overall system performance and efficiency.

实时多核系统中的任务调度对于满足严格的时序要求至关重要,尤其是在嵌入式系统日益普及的情况下。特别是电池供电的系统,需要节能的调度程序来调节处理器的速度和温度。当前基于软件的调度器面临着诸如开销、延迟和低效率等限制,这使得平衡性能与能源和热管理变得具有挑战性。这突出了在异构多核处理器环境中对更多动态调度器的需求,特别是对于独立任务调度,它必须在优化能耗和温度控制的同时解决这些挑战。本文提出了一种专为独立任务设计的在线分布式硬件调度程序,利用最早截止日期优先(EDF)算法来管理多核嵌入式系统上的硬实时任务。与基于软件的解决方案相比,在硬件中实现这个调度器可以减少时钟周期,提高效率并降低延迟。它动态地适应实时任务,而不会损害可预测性或引入显著的开销。调度器优化能源消耗和温度管理,解决动态和静态能源需求。结果表明,动态能量降低了51.16%;与高性能实时硬件调度器(HRHS)相比,静态能量降低50.82%,温度降低20.21%,同时保持整体系统性能和效率。
{"title":"Independent Task Scheduling in Multi-Core Systems: A Hardware-Based Approach for Optimising Energy and Thermal Efficiency","authors":"Mohammadreza Saberikia,&nbsp;Hakem Beitollahi,&nbsp;Hamed Farbeh","doi":"10.1049/cps2.70034","DOIUrl":"https://doi.org/10.1049/cps2.70034","url":null,"abstract":"<p>Task scheduling in real-time multi-core systems is crucial for meeting stringent timing requirements, especially as embedded systems become increasingly prevalent. Battery-powered systems, in particular, require energy-efficient schedulers to regulate processor speed and temperature. Current software-based schedulers face limitations, such as overhead, latency and inefficiencies, making it challenging to balance performance with energy and thermal management. This highlights the need for more dynamic schedulers in heterogeneous multi-core processor environments, particularly for independent task scheduling, which must address these challenges while optimising both energy consumption and temperature control. This paper presents an online distributed hardware scheduler designed specifically for independent tasks, utilising the earliest deadline first (EDF) algorithm to manage hard real-time tasks on multi-core embedded systems. Implementing this scheduler in hardware reduces clock cycles, improves efficiency and lowers latency compared to software-based solutions. It dynamically adapts to real-time tasks without compromising predictability or introducing significant overhead. The scheduler optimises energy consumption and temperature management, addressing both dynamic and static energy demands. Results show a reduction of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>51.16</mn>\u0000 <mi>%</mi>\u0000 </mrow>\u0000 <annotation> $51.16%$</annotation>\u0000 </semantics></math> in dynamic energy, <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>50.82</mn>\u0000 <mi>%</mi>\u0000 </mrow>\u0000 <annotation> $50.82%$</annotation>\u0000 </semantics></math> in static energy and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>20.21</mn>\u0000 <mi>%</mi>\u0000 </mrow>\u0000 <annotation> $20.21%$</annotation>\u0000 </semantics></math> in temperature compared to the high-performance real-time hardware scheduler (HRHS), while maintaining overall system performance and efficiency.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Transformation Method of Service Centre Data Model in Power Grid Resource Service 电网资源服务中服务中心数据模型的快速转换方法
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-17 DOI: 10.1049/cps2.70030
Li Chen, Wenyuan Bai, Shaobo Liu, Wei Chen, Jun Wang

In the processing of power grid resource data, incomplete data from service centres lead to data loss, incompleteness, or inaccuracy, which seriously affects the training of neural networks. In terms of intelligent diagnosis of power grid faults, the misjudgement rate of fault diagnosis has significantly increased due to data problems. In some areas, the time for fault analysis has been greatly extended, and maintenance has been delayed, resulting in prolonged power outages. For example, in Guang'an, Sichuan, citizens are charged 192 yuan in electricity bills for one night, causing huge economic losses to residents' lives and industrial production. In this regard, this article chooses a bad data processing scheme based on cosine similarity and a data normalisation scheme based on standardisation to preprocess the full path names in the data model structure of power grid resource business. Then, a linear neural network suitable for the full path name characteristics of power grid equipment is selected, and a neural network framework is set up. The sample data are used to train the neural network to realise the full path name conversion of the remaining large number of power grid equipment. The experiment shows that the optimisation effect of the model established in this article is affected by multiple parameters. When the comprehensive ratio is controlled at 0.7 and the number of neighbours k is 30, the model achieves the best conversion efficiency, and its recommended accuracy can reach 75%. Subsequently, the optimisation model that achieves the best efficiency is compared with traditional collaborative filtering recommendation algorithms or translation models. Compared with the TransH model, the proposed model has added 1.23% and 10% more new data at 45 and 40 min of operation, respectively. The result proves that the neural network model established in this paper can better adapt to power grid data conversion work, ensuring the automation and efficiency of power grid data transmission.

在处理电网资源数据时,服务中心的数据不完整会导致数据丢失、不完整或不准确,严重影响神经网络的训练。在电网故障智能诊断方面,由于数据问题,故障诊断的误判率显著增加。在一些地区,故障分析时间大大延长,维修延误,导致停电时间延长。例如,在四川广安,市民一晚被收取192元电费,给居民生活和工业生产造成了巨大的经济损失。为此,本文选择基于余弦相似度的不良数据处理方案和基于标准化的数据规范化方案,对电网资源业务数据模型结构中的全路径名进行预处理。然后,选择适合电网设备全路径名称特征的线性神经网络,建立神经网络框架;利用样本数据训练神经网络,实现剩余大量电网设备的全路径名称转换。实验表明,本文建立的模型的优化效果受到多个参数的影响。当综合比控制在0.7,邻居数k为30时,模型的转换效率最佳,推荐准确率可达75%。然后,将达到最佳效率的优化模型与传统的协同过滤推荐算法或翻译模型进行比较。与TransH模型相比,该模型在运行45 min和40 min时分别增加了1.23%和10%的新数据。结果表明,本文建立的神经网络模型能较好地适应电网数据转换工作,保证了电网数据传输的自动化和高效性。
{"title":"Fast Transformation Method of Service Centre Data Model in Power Grid Resource Service","authors":"Li Chen,&nbsp;Wenyuan Bai,&nbsp;Shaobo Liu,&nbsp;Wei Chen,&nbsp;Jun Wang","doi":"10.1049/cps2.70030","DOIUrl":"https://doi.org/10.1049/cps2.70030","url":null,"abstract":"<p>In the processing of power grid resource data, incomplete data from service centres lead to data loss, incompleteness, or inaccuracy, which seriously affects the training of neural networks. In terms of intelligent diagnosis of power grid faults, the misjudgement rate of fault diagnosis has significantly increased due to data problems. In some areas, the time for fault analysis has been greatly extended, and maintenance has been delayed, resulting in prolonged power outages. For example, in Guang'an, Sichuan, citizens are charged 192 yuan in electricity bills for one night, causing huge economic losses to residents' lives and industrial production. In this regard, this article chooses a bad data processing scheme based on cosine similarity and a data normalisation scheme based on standardisation to preprocess the full path names in the data model structure of power grid resource business. Then, a linear neural network suitable for the full path name characteristics of power grid equipment is selected, and a neural network framework is set up. The sample data are used to train the neural network to realise the full path name conversion of the remaining large number of power grid equipment. The experiment shows that the optimisation effect of the model established in this article is affected by multiple parameters. When the comprehensive ratio is controlled at 0.7 and the number of neighbours k is 30, the model achieves the best conversion efficiency, and its recommended accuracy can reach 75%. Subsequently, the optimisation model that achieves the best efficiency is compared with traditional collaborative filtering recommendation algorithms or translation models. Compared with the TransH model, the proposed model has added 1.23% and 10% more new data at 45 and 40 min of operation, respectively. The result proves that the neural network model established in this paper can better adapt to power grid data conversion work, ensuring the automation and efficiency of power grid data transmission.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘ReLIC: Reduced Logic Inference for Composition’ for Quantifier Elimination-Based Compositional Reasoning and Verification 基于量词消除的组合推理与验证的ReLIC: reduce Logic Inference for Composition
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-30 DOI: 10.1049/cps2.70033
Hao Ren, Ratnesh Kumar
<p>Formally verifying complex model-based designs has posed a significant challenge for complex systems, primarily due to their sheer scale and the critical nature of safety involved. A common method for tackling this challenge is the divide-and-conquer strategy, which leverages the system model architecture to decompose the verification tasks into smaller subtasks focused on subsystems or components. This approach entails articulating the verification goals as formal property contracts and subsequently verifying each one separately. Once the individual contracts of the subsystems or components are validated, they are integrated through formal reasoning to achieve verification at the system level also represented as a formal property contract. However, the current procedures and tools designed for this type of compositional verification often requires manual postulation of system-level contracts and are susceptible to false alarms in verification outcomes due to over-approximation. In the paper, we introduce our approach to compositional reasoning and verification using quantifier elimination (QE), which automates the derivation of the strongest system-level property given the component-level ones and their connectivity, enabling precise automated analysis for even time-dependent and nonlinear systems. QE serves as the foundation for <i>composition calculus</i>, allowing us to derive the <i>strongest system-level property</i> in a single step. We begin by applying this framework to properties that are time-independent, and subsequently, we expand our approach to encompass the composition of time-dependent properties. For the latter case, we shift the given properties over time to span the time horizon of interest, which we show to be no greater than the total time horizons of the component-level properties. Similarly, we use QE to infer the system-initial-condition from the component-level initial conditions. The automatically inferred strongest system-level property becomes useful in verifying a postulated desired system-level property through induction, involving inferred strongest system-level property and its initial condition. In this regard, we also advance the existing <span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation> $k$</annotation> </semantics></math>-induction based model-checking by incorporating QE and formulating its base and inductive steps as QE problems. Our composition approach is uniform regardless of the type of composition (cascade/parallel/feedback) and regardless the component properties being composed are time-independent or time-dependent. We also present a prototype verifier called ReLIC (Reduced Logic Inference for Composition), which implements our approach and demonstrate it through several illustrative and practical examples. We also demonstrate the recent integration of our approach into an i
正式验证复杂的基于模型的设计对复杂系统提出了重大挑战,主要是因为它们的规模和安全的关键性质。处理这一挑战的一个常用方法是分而治之的策略,它利用系统模型体系结构将验证任务分解为关注子系统或组件的更小的子任务。这种方法需要将验证目标表述为正式的财产合同,然后分别验证每个目标。一旦子系统或组件的单个契约被验证,它们将通过正式的推理来集成,以实现系统级别的验证,也表示为正式的财产契约。然而,目前为这种类型的组合验证设计的程序和工具通常需要手动假设系统级契约,并且由于过度近似而容易在验证结果中产生假警报。在本文中,我们介绍了我们使用量词消除(QE)进行组合推理和验证的方法,该方法可以自动推导出给定组件级属性及其连通性的最强系统级属性,从而能够对时间相关和非线性系统进行精确的自动化分析。QE作为组合演算的基础,允许我们在一个步骤中推导出最强的系统级属性。我们首先将这个框架应用于时间无关的属性,随后,我们扩展我们的方法来包含时间相关属性的组合。对于后一种情况,我们将给定的属性随着时间的推移而移动,以跨越感兴趣的时间范围,我们显示该时间范围不大于组件级属性的总时间范围。类似地,我们使用QE从组件级初始条件推断系统初始条件。自动推断的最强系统级属性在通过归纳验证假设的期望系统级属性时非常有用,包括推断的最强系统级属性及其初始条件。在这方面,我们还通过纳入QE并将其基础和归纳步骤制定为QE问题来推进现有的基于k$ k$归纳的模型检验。我们的组合方法是统一的,不管组合的类型是什么(级联/并行/反馈),也不管组成的组件属性是时间无关的还是时间相关的。我们还提出了一个名为ReLIC (reduce Logic Inference for Composition)的原型验证器,它实现了我们的方法,并通过几个说和实际的例子进行了演示。我们还展示了最近将我们的方法集成到工业验证和验证(V&;V)工具套件中,该工具套件允许对Simulink模型和深度神经网络(dnn)进行增强静态分析。
{"title":"‘ReLIC: Reduced Logic Inference for Composition’ for Quantifier Elimination-Based Compositional Reasoning and Verification","authors":"Hao Ren,&nbsp;Ratnesh Kumar","doi":"10.1049/cps2.70033","DOIUrl":"https://doi.org/10.1049/cps2.70033","url":null,"abstract":"&lt;p&gt;Formally verifying complex model-based designs has posed a significant challenge for complex systems, primarily due to their sheer scale and the critical nature of safety involved. A common method for tackling this challenge is the divide-and-conquer strategy, which leverages the system model architecture to decompose the verification tasks into smaller subtasks focused on subsystems or components. This approach entails articulating the verification goals as formal property contracts and subsequently verifying each one separately. Once the individual contracts of the subsystems or components are validated, they are integrated through formal reasoning to achieve verification at the system level also represented as a formal property contract. However, the current procedures and tools designed for this type of compositional verification often requires manual postulation of system-level contracts and are susceptible to false alarms in verification outcomes due to over-approximation. In the paper, we introduce our approach to compositional reasoning and verification using quantifier elimination (QE), which automates the derivation of the strongest system-level property given the component-level ones and their connectivity, enabling precise automated analysis for even time-dependent and nonlinear systems. QE serves as the foundation for &lt;i&gt;composition calculus&lt;/i&gt;, allowing us to derive the &lt;i&gt;strongest system-level property&lt;/i&gt; in a single step. We begin by applying this framework to properties that are time-independent, and subsequently, we expand our approach to encompass the composition of time-dependent properties. For the latter case, we shift the given properties over time to span the time horizon of interest, which we show to be no greater than the total time horizons of the component-level properties. Similarly, we use QE to infer the system-initial-condition from the component-level initial conditions. The automatically inferred strongest system-level property becomes useful in verifying a postulated desired system-level property through induction, involving inferred strongest system-level property and its initial condition. In this regard, we also advance the existing &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $k$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;-induction based model-checking by incorporating QE and formulating its base and inductive steps as QE problems. Our composition approach is uniform regardless of the type of composition (cascade/parallel/feedback) and regardless the component properties being composed are time-independent or time-dependent. We also present a prototype verifier called ReLIC (Reduced Logic Inference for Composition), which implements our approach and demonstrate it through several illustrative and practical examples. We also demonstrate the recent integration of our approach into an i","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145224546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimising Energy Efficiency in Agricultural Consumer Electronics Using Principal Component Analysis and Deep Q-Learning 利用主成分分析和深度q -学习优化农业消费电子产品的能源效率
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-05 DOI: 10.1049/cps2.70029
Subir Gupta, Upasana Adhikari, Pinky Pramanik, Subrata Chowdhury, Shreyas J., Anurag Sinha, Saifullah Khalid, Malathi S. Y.

The ability to reduce emissions and improve sustainability in agricultural consumer electronics has been significantly hindered due to the use of energy-intensive technology within the agricultural sector. This study proposes a new enhancement of deep Q-learning (DQN) with principal component analysis (PCA) focused on energy efficiency. PCA helps manage massive operational data by performing dimensionality reduction, whereas DQN, a reinforcement learning paradigm, optimises decision-making during real-world interactions. The main contribution of this study is in the combined use of PCA and DQN to form customisable, precise, contest-responsive energy frameworks powered by real-time analytics on agricultural data—energy management on such a scale has not been approached in the context of sustainable agriculture before. The experiments confirm the optimal model, further achieving a cumulative reward of 72.56, an average emission of 1.83, a Q-value of 24.76 and a total zenith value of 75.40% in ensuring numerous noncriteria-defined efficient energy-dependent operations. This paradigm not only fills the void in the automation of passive intelligent agricultural systems but also serves as a point of reference for other eco-critical domains to strive towards greener technology.

由于在农业部门使用能源密集型技术,减少农业消费电子产品排放和提高可持续性的能力受到了严重阻碍。本文提出了一种基于能量效率的主成分分析方法来增强深度q学习(DQN)。PCA通过执行降维来帮助管理大量操作数据,而DQN是一种强化学习范式,在现实世界的交互过程中优化决策。本研究的主要贡献在于将PCA和DQN结合使用,形成可定制的、精确的、响应竞赛的能源框架,该框架由对农业数据的实时分析提供动力,这种规模的能源管理在可持续农业的背景下从未被接触过。实验验证了最优模型,进一步实现了累计奖励为72.56,平均排放为1.83,q值为24.76,总天顶值为75.40%,确保了大量非标准定义的高效能源依赖操作。这种模式不仅填补了被动智能农业系统自动化的空白,而且还为其他生态关键领域努力实现更环保的技术提供了参考。
{"title":"Optimising Energy Efficiency in Agricultural Consumer Electronics Using Principal Component Analysis and Deep Q-Learning","authors":"Subir Gupta,&nbsp;Upasana Adhikari,&nbsp;Pinky Pramanik,&nbsp;Subrata Chowdhury,&nbsp;Shreyas J.,&nbsp;Anurag Sinha,&nbsp;Saifullah Khalid,&nbsp;Malathi S. Y.","doi":"10.1049/cps2.70029","DOIUrl":"10.1049/cps2.70029","url":null,"abstract":"<p>The ability to reduce emissions and improve sustainability in agricultural consumer electronics has been significantly hindered due to the use of energy-intensive technology within the agricultural sector. This study proposes a new enhancement of deep Q-learning (DQN) with principal component analysis (PCA) focused on energy efficiency. PCA helps manage massive operational data by performing dimensionality reduction, whereas DQN, a reinforcement learning paradigm, optimises decision-making during real-world interactions. The main contribution of this study is in the combined use of PCA and DQN to form customisable, precise, contest-responsive energy frameworks powered by real-time analytics on agricultural data—energy management on such a scale has not been approached in the context of sustainable agriculture before. The experiments confirm the optimal model, further achieving a cumulative reward of 72.56, an average emission of 1.83, a <i>Q</i>-value of 24.76 and a total zenith value of 75.40% in ensuring numerous noncriteria-defined efficient energy-dependent operations. This paradigm not only fills the void in the automation of passive intelligent agricultural systems but also serves as a point of reference for other eco-critical domains to strive towards greener technology.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1