Open Access. Powered by Scholars. Published by Universities.®

Systems Science Commons

Open Access. Powered by Scholars. Published by Universities.®

3,421 Full-Text Articles 8,327 Authors 73,003 Downloads 43 Institutions

All Articles in Systems Science

Faceted Search

3,421 full-text articles. Page 1 of 170.

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel 2024 University at Albany, SUNY

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie 2024 Washington State University

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, LTC Ekzhin Ear, Dr. Shouhuai Xu 2024 University of Colorado, Colorado Springs (UCCS)

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin 2024 Washington State University

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. DeNaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu 2024 Virginia Tech

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar 2024 University at Albany

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Environmental Analysis Of Codfish Production And Consumption In Portugal, Ayla Frost, Joana Almeida, Joana Dionisio, Radu Godina, Cátia Magro 2024 School for International Training

Environmental Analysis Of Codfish Production And Consumption In Portugal, Ayla Frost, Joana Almeida, Joana Dionisio, Radu Godina, Cátia Magro

Journal of Critical Global Issues

Codfish, a typical dish consumed frequently in Portugal, is fished in the cold Northern Atlantic waters far from the Portuguese coast. Thus, regional tensions and the environmental impacts of Portuguese codfish importation and production are significant current issues. The present study uses a life cycle assessment methodology to evaluate the array of environmental impacts of the production of 1 kg of codfish, following a cradle to gate approach. The life cycle inventory was grouped into catch and preprocessing, transit, and curing stages. The data collection of products and processes in each stage was based on scientific peer reviewed documents, technical …


Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou 2024 College of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090, China

Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou

Journal of System Simulation

Abstract: To better meet the development needs of China's new power system, an optimal scheduling strategy of virtual power plant(VPP) with carbon emission and carbon penalty considering the uncertainty of wind power and photovoltaic power is proposed. The mathematical description of photovoltaic(PV), wind turbine(WT), combined heat and power(CHP) unit and energy storage system (ESS) is carried out, and a wind-solar output model considering the uncertainty is established. The scenario generation and reduction method is used to generate the typical scenario. To maximize the overall operation benefit of VPP, considering carbon emission cost and carbon penalty, an optimal scheduling model of …


Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang 2024 School of Sciences, Jiangxi University of Science and Technology, Ganzhou 341000, China; School of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China

Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang

Journal of System Simulation

Abstract: The development of electric vehicle provides an alternative to conventional fuel vehicles for logistics companies. Using electric vehicles has the merits of less pollution and low noise, but the characteristics of limited cruising range and limited number of charging stations are new challenges. Electric vehicle routing problems(EVRPs) have been widely used in transportation, logistics and other fields, and have received much attention. A comprehensive survey of EVRP and its many variants are presented and the respective backgrounds and applicable conditions are analyzed. The solving approaches of EVRPs are categorized, the strengths and weaknesses of each algorithm are analyzed, and …


Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie 2024 Department of Automation, North China Electric Power University, Baoding 071003, China

Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie

Journal of System Simulation

Abstract: To ensure the economy and stability of microgrid operation, the power fluctuations of renewable energy source (RES) and the lifetime characteristics of battery energy storage system (BESS) should be considered. The influence of charging and discharging depth and rate on the lifetime of BESS is researched, a model of battery energy storage system for real-time optimal scheduling is established, and the alternating direction method of multipliers is adopted for the distributed optimal scheduling of microgrid clusters. The distributed optimization method does not require any global information and can protect the privacy of microgrid in the maximum extent. Simulation results …


Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo 2024 School of Automation, Nanjing University of Information Science & Technology, Nanjing 210044, China; Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing 210044, China

Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo

Journal of System Simulation

Abstract: Broad learning system(BLS) is introduced to tackle the existed disadvantage that LSTM-based runoff prediction model is easy to fall into local optimization. To reduce the influence of noise on the prediction results, the variational mode decomposition (VMD) is adopted to transform the onedimensional time-domain runoff signal to the two-dimensional time-frequency plane. The runoff prediction model based on VMD-LSTM-BLS is proposed. The simulation results demonstrate that the prediction accuracy of the new model is more significantly improved compared with the baseline model and the existing LSTM-based runoff prediction model.


Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen 2024 Sino-US Global Logistics Institute, Antai College of Economics and Management, Shanghai Jiao Tong University, Shanghai 200030, China

Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen

Journal of System Simulation

Abstract: As a complete automated guided vehicle(AGV) system scheduling algorithm, it must include conflict-handling strategy, together with common dispatching strategy and routing algorithm. However, due to the uncertainty, characteristics of such scheduling algorithm are difficult to be analyzed theoretically, and the relevant study is lacking. An AGV system simulation platform based on the discreteevent simulation technique is designed and developed, which can flexibly set the scheduling problem, choose the dispatching strategy, routing algorithm, and conflict-handling strategy for the scheduling algorithm, to run the simulation. The platform has a visual interface, from which the running status of AGVs and the performance …


Robust Predictive Control Of Nonplanar Fully-Actuated Uavs, Yun Ma, Yuan Wang, Meng Li, Peng Wang, Yanling Tang 2024 School of Mechanical Engineering, Yangzhou University, Yangzhou 225127, China

Robust Predictive Control Of Nonplanar Fully-Actuated Uavs, Yun Ma, Yuan Wang, Meng Li, Peng Wang, Yanling Tang

Journal of System Simulation

Abstract: Targeting the problem that nonplanar fully-actuated unmanned aerial vehicles (UAVs) are susceptible to external winds and unmodeled dynamics, the predictive control system with good robustness is designed. A nonlinear motion model with six degrees of freedom is established through the Newton-Euler approach. A linear extended state observer is designed to estimate the state variables by transforming the system affected by matched and unmatched disturbances into an equivalent system only affected by the matched disturbances. A predictive controller is designed for the equivalent system to reduce the output oscillation and input surging and a disturbance compensator is also designed to …


Fault Detection Based On Sliding Window And Multiblock Convolutional Autoencoders, Jianpeng Mou, Weili Xiong 2024 School of Internet of Things Engineering, Jiangnan University, Wuxi 214122, China

Fault Detection Based On Sliding Window And Multiblock Convolutional Autoencoders, Jianpeng Mou, Weili Xiong

Journal of System Simulation

Abstract: In order to further improve the fault detection performance and fully mine the timing and hidden feature information, a fault detection method based on convolutional auto encoder is proposed. On the basis of modeling the original information set, the modeling of cumulative information and rate of change information is added to enhance the mining of implicit information; The three reconstructed information sets are sampled by sliding windows, and time series feature extraction and modeling are performed based on convolutional auto encoders. Bayesian fusion of the decision results of the convolutional auto encoder is performed to obtain the statistics, and …


Short-Term Bus Passenger Flow Prediction Based On Convolutional Long-Short-Term Memory Network, Jing Chen, Zhaochong Zhang, Linkai Wang, Mai An, Wei Wang 2024 School of Information Technology and Engineering, Tianjin University of Technology and Education, Tianjin 300222, China

Short-Term Bus Passenger Flow Prediction Based On Convolutional Long-Short-Term Memory Network, Jing Chen, Zhaochong Zhang, Linkai Wang, Mai An, Wei Wang

Journal of System Simulation

Abstract: To address the problem that the traditional short-time passenger flow prediction method does not consider the temporal characteristics similarity between the inter-temporal passenger flows, a shorttime passenger flow prediction model k-CNN-LSTM is proposed by combining the improved k-means clustering algorithm with the CNN and the LSTM. The k-means is used to cluster the intertemporal timeseries data, the k-value is determined by using the gap-statistic, and a traffic flow matrix model is constructed. A CNN-LSTM network is used to process the short-time passenger flows with spatial and temporal characteristics. The model is tested and parameter tuned by the real dataset. …


Design Of 3d Visualization Monitoring System For Oil Field Pumping Unit Based On Unity3d, Liqiang Liu, Wenlei Sun, Yi Wang, Bingkai Wang 2024 School of Mechanical Engineering, Xinjiang University, Urumqi 830017, China

Design Of 3d Visualization Monitoring System For Oil Field Pumping Unit Based On Unity3d, Liqiang Liu, Wenlei Sun, Yi Wang, Bingkai Wang

Journal of System Simulation

Abstract: Aiming at the defects of single monitoring form, low degree of 3D visualization and poor linkage of pumping unit, the information-physical real-time mapping is introduced to develop the 3D visualization monitoring system for oil field pumping unit. The digital space of pumping unit are designed and the design architecture of virtual-real interaction layer is built. The composition and relation framework of 3D visualization system are built. Combined with the inverse kinematics, the mathematical model is built, and the overall architecture of the pumping unit 3D visualization system is designed based on the five-dimensional model and Unity3D platform. The beam …


Ground Target Recognition And Damage Assessment Of Patrol Missiles Based On Multi-Source Information Fusion, Yibo Xu, Qinghua Yu, Yanjuan Wang, Ce Guo, Shiru Feng, Huimin Lu 2024 College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China

Ground Target Recognition And Damage Assessment Of Patrol Missiles Based On Multi-Source Information Fusion, Yibo Xu, Qinghua Yu, Yanjuan Wang, Ce Guo, Shiru Feng, Huimin Lu

Journal of System Simulation

Abstract: For the multiple patrol missiles to attack the high defense capacity targets, a mobile ground target detection and damage assessment method based on multi-source information fusion is proposed. The multi-source information fusion of infrared images and RGB images is carried out by using IoU determination. A novel two-stage tightly coupled damage assessment method based on YOLO-VGGNet of patrol missiles to mobile ground targets is proposed. This method can fully use the advantage of deep semantic information extraction of CNNs and introduce the infrared damaging information simultaneously to achieve the online and real-time damage assessment of mobile ground targets. The …


Efficiency Optimization Method For Data Sampling In Power Grid Topology Scheduling Simulation, Yingying Zhao, Pusen Dong, Tianchen Zhu, Fan Li, Yun Su, Zhenying Tai, Qingyun Sun, Hang Fan 2024 State Grid Shanghai Electrical Power Research Institute, Shanghai 200437, China; State Grid Shanghai Municipal Electric Power Company, Shanghai 200125, China

Efficiency Optimization Method For Data Sampling In Power Grid Topology Scheduling Simulation, Yingying Zhao, Pusen Dong, Tianchen Zhu, Fan Li, Yun Su, Zhenying Tai, Qingyun Sun, Hang Fan

Journal of System Simulation

Abstract: To address the large simulation computational workload and low simulation speed caused by the scale and complexity of the new power system, a simulation acceleration method for topology scheduling based on the distributed and quantization mechanisms is proposed. The parallelization of topology scheduling models is used to increase the scale of data simulation sampling in unit time. The introduced quantization operators accelerate the computation speed of the topology scheduling model operators, reduces the time cost of the every single simulation. Case studies confirm the effectiveness of the topology simulation acceleration, in which the available transfer capacity of the simulated …


A Simplification Method Of Large-Scale Unit Commitment Model Based On Boundary Method, Yanping Xu, Mingxin Zhao, Xiaohui Qin, Keyou He, Xiaohan Wu, Pei Zhang 2024 China Electric Power Research Institute, Beijing 100192, China

A Simplification Method Of Large-Scale Unit Commitment Model Based On Boundary Method, Yanping Xu, Mingxin Zhao, Xiaohui Qin, Keyou He, Xiaohan Wu, Pei Zhang

Journal of System Simulation

Abstract: As the scale of power grid expands, in the market environment, the variables and constraints in the security-constrained unit commitment (SCUC) model considering power grid security constraints increase significantly and the solvability of the model reduces. When the model scale is too large, even the existing commercial solvers cannot solve it. Aiming at the model rapid solving, from the perspective of reducing the number of model constraints, a linear constraint simplification method based on the boundary method is proposed. The proposed method can effectively reduce the model's size by eliminating the redundant linear constraints. The IEEE-39, WECC 179 and …


Dynamic Spatio-Temporal Anomaly-Aware Correlation Filtering Object Tracking Algorithm, Yunfei Qiu, Xiangrui Bu, Boqiang Zhang 2024 College of Software, Liaoning Technical University, Huludao 125105, China

Dynamic Spatio-Temporal Anomaly-Aware Correlation Filtering Object Tracking Algorithm, Yunfei Qiu, Xiangrui Bu, Boqiang Zhang

Journal of System Simulation

Abstract: In view of the fact that the background perception algorithm does not establish a relationship with the spatio-temporal domain characteristics of the target, and cannot accurately deal with the occlusion, deformation and other abnormal tracking, a object tracking algorithm which can adaptively perceive the spatio-temporal anomalies is proposed. In the training stage of correlation filter, the adaptive spatial regularization term is introduced to establish a relationship with the spatio-temporal characteristics of sample. The abnormal perception method is proposed according to the peak value of response map. Taking advantage of the different confidence of historical filter and the continuity of …


Digital Commons powered by bepress