A Cloud-Fog-Edge Closed-Loop Feedback Security Risk Prediction Method
نویسندگان
چکیده
منابع مشابه
A Closed Loop Feedback Method for a Manual Bar Straightener
Automation of a unique manually controlled industrial bar straightener is proposed. A continuous-time closed loop model is constructed in Simulink for an event-driven process through the use of asynchronous timers. The system is simulated with linear and nonlinear PD controllers. A nonlinear filter, called the tracking differentiator, is introduced as an alternative to a linear approximate mean...
متن کاملClosed-loop Acceleration Feedback
Historically, sensor noise has been a key factor in the analysis of system performance for formation flying spacecraft. Since most interesting formation missions require coordination between multiple spacecraft, knowledge of the relative states must be as accurate as possible. This knowledge is typically used to design a trajectory to meet specific criteria, such as minimizing fuel use or maint...
متن کاملA virtual closed loop method for closed loop identification
Indirect methods for identification of linear plant models on the basis of closed-loop data are based on the use of (reconstructed) input signals that are uncorrelated with the noise. This generally requires exact (linear) controller knowledge. On the other hand, direct identification requires exact plant and noise modelling (system in the model set) in order to achieve accurate results, althou...
متن کاملCircuit Design of Digital Closed Loop Control System for FOG
Fiber optic gyroscope (FOG) is a new angular rate sensor based on the Sagnac effect. It has been widely applied in the navigation control system of aircrafts, spacecrafts and ships. But its stability, reliability and miniaturization are always the research focuses and difficulties. This paper presented a circuit design method for the digital closed loop control system of FOG based on FPGA. Base...
متن کاملSafe and Secure Execution at the Network Edge: A Framework for Coordinating Cloud, Fog, and Edge
System design where cyber-physical applications are securely coordinated from the cloud may simplify the development process. However, all private data are then pushed to these remote ‘swamps’, and human users lose the actual control as compared to when the applications are executed directly on their devices. At the same time, computing at the network edge is still lacking support for such stra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2972032