339
DEPEND ABILITY ANALYSIS ON CPS USING MACHINE LEARNING TECHNIQUES
Krishna Narayanan S1*, Dhanasekaran S2, Vasudevan V3
Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education, Srivilliputtur, Tamilnadu, India123
Received : 14 September 2023, Revised: 06 November 2023, Accepted : 17 November 2023
*Corresponding Author
ABSTRACT
A Cyber-Physical System (CPS) is an entity that effortlessly monitors and controls physical operations by integrating computational and physical elements. Dependability on the CPS application program and also proposes a real-time analysis approach to CPS application dependability based upon Artificial Intelligence and Machine Learning (ML). For starters, pick complicated networks to determine tips within the system topology on the CPS application process. Unsupervised mastering category by a quick density clustering algorithm to classify the value of nodes could be successfully put on the crucial analysis of nodes in CPS application program as well as help support the setting up of CPS software phone Secondly, a real-time CPS dependability automated internet analysis technique is suggested. Unreliable methods are able to imply big losses, each monetarily in addition to within man's life. On a good mention, CPS has information like the main component of the operation of theirs. The prevalence and availability of information demonstrate a brand-new chance to change the methods within what dependability evaluation continues to be usually performed. This process utilizes printer mastering tips to create an analysis framework, design, and style an internet queuing algorithm, as well as put into action real-time internet evaluation and analysis of CPS dependability. Preventive steps make sure that the device works ordinarily as well as with no interruption, which significantly betters method dependability. Last but not least, simulation final results verify the usefulness of the analysis technique and the broad application prospects of its.
Keywords: CPS, Dependability, Machine Learning, Components.
1. Introduction
The actual physical fusion product is a hybrid car process which has actual physical entities as well as cd entities and also fuses actual physical information and processes procedures in concert. Recently, re-search hotspots of scholars in your medicine cabinet as well as abroad have already been popular within the systematic society. The primary ideas of CPS may be summarized as 3C, which is, CPS is a multi-dimensional complicated method that combines physical, communication, and computing setting. The program of the system type is an intricate sent out software application process which refers to parts across devices and platforms. It takes incredibly tall dependability to make sure that the device may constantly stay in a dependable program suggest all the time. Together with the constant advancement of CPS hardware engineering, software program malfunction has turned out to be the primary reason for the disappointment of the whole CPS feature. With existing, a great deal of investigation job continues to be performed on a software application dependability development design from home as well as abroad. In general, the primary techniques for creating applications dependability are split into 2 types (Lv et al., 2020; Khan et al., 2020; Castaño et al., 2019) stochastic procedure as well as non-stochastic procedure versions. The prediction design influenced by conventional assumptions is easily the most traditional software program dependability development type within the first many days. Some of them, the program dependability development design according to the non-homogeneous Poisson progression as well as Markov procedure is essentially the most popular and many explored software application reliability growth versions.
Encryption technique also considered in dependability analysis of CPS (Ahilan & Jeyam, 2023).
Presuming that the number of problems over the program assessment stage obeys the Markov procedure, a J M design is suggested (Pan et al., 2019). The J M design was used within the Indian Navy Ship Computing facility plus attained extremely excellent outcomes. Before unit according to a non-homogeneous Poisson procedure is suggested (Martins et al., 2020). The
340
design assumes the complete amount of software application problems is regular, that the program disaster fee is favourably associated towards the variety of staying applications problems, which every malfunction will cause the identical likelihood of a software application disaster, which absolutely no brand-new problems are launched after disappointment maintenance. The GO design makes considerable efforts within academic fields and engineering. The designs recommended in several later on types of literature are based upon the GO design to enhance the assumptions on the GO design. Together with the fast advancement of ML algorithms, some scientists have investigated the usage of ML strategies to construct software application dependability, development versions. Based on various kinds of ML algorithms, software program dependability development designs according to ML algorithms are about split into 2 groups, specifically a program reliability growth models based upon monitored learning as well as cd reliability growth models based upon semi-supervised learning. Application malfunction functions are obtained from an established software application defect information established, along with a naive Bayes algorithm is utilized to create a program dependability prediction design according to the suggested characteristics.
Because of this, the dependability prediction of the CPS software program has great homework worth. In accordance with this particular track record, this particular newspaper proposes an analysis technique based on printer learning how to enhance the dependability of CPS. A real time dependability analysis design based upon adaptive neighbour and ML principle is suggested. The dependability of the CPS software program is expected to confirm the feasibility of the technique, and yes it may be nicely put on towards the dependability evaluation of CPS application. The dependability list design based upon ML is talked about, after which the CPS application dependability analysis technique is suggested. Last but not least, a good example is provided to illustrate the usefulness of the suggested approach.
2. Literature Review
The conventional research outcomes of various researchers have been analyzed and compared to identify the research gap as well as the research problem. On reviewing recent researches based on the CPS, recommended by the scientific community, the advantages, challenges, complexity and shortcomings can be determined. The research articles relevant to the objective of this work was gathered from reputed and well-esteemed journals. The preference in selecting the journals for review is mostly decided by the appropriate, highly impacted, qualitative and quantitative outcomes.
CPS is marking the time of ours and also, they're recognized through the perfect integration of physical parts and the cyber. Together each new opportunity and challenge is carried by this integration. The blend of software program, as well as hardware components, suggests more complicated methods which are susceptible to complex interdependencies affecting the complete dependability (Hartsell et al., 2019a; Zhang et al., 2019; Liu et al., 2020; Wang et al., 2019;
Mozaffari et al., 2020; Li et al., 2019; Sigamani, 2020; Yu et al., 2020; Boursinos & Koutsoukos, 2020). Dependability, and that quantifies the likelihood which a process works as anticipated for a predefined length of period, while effectively-identified around hardware, isn't as certainly identified within a software application. For this, we usually have to incorporate the interaction with people which is additionally a crucial element of the dependable performance of CPS as people don't constantly display anticipated actions. Humans, or users in common, will be able to connect with CPS within several methods, sometimes as real people or maybe as upkeep or even set up personnel, for example. Every one of the interactions is both a chance along with a threat with regard to the dependability of CPS, as have been elaborated (Fei et al., 2019).
Thus, interactions with people may substantially impact the complete telephone system dependability & they have to become model, examined as well as tackled within an extensive fashion. Nevertheless, like the man interaction factor more complicates the dependability computations. Until finally today, operator interaction continues to be insufficiently dealt with dependability modelling. Even during several initiatives to far more holistically evaluate dependability, the man element has become overseen (Kumar et al., 2017a; Gutierrez-Rojas et al., 2020; Pham et al., 2020; Hartsell et al., 2019b; Kumar et al., 2023; Shengdong et al., 2019;
Therase, et al., 2023). Unreliable methods change to big areas of downtime, which may indicate
341
considerable losses, each economically, and also of conditions of endangering man life. In addition, an unreliable method is a lot more vulnerable to protection strikes. On a good mention, CPS has information like the main section of the operation of theirs. Prevalence and availability of information that is brand new chances in order to transform the methods within what dependability evaluation continues to be usually carried out, usually by means of considerable utilization of pro understanding (Chiu et al., 2020; Usha et al., 2023).
The proper framework is discussed to style & evaluate energy-constrained real-time methods. Get architecture level details as well as power usage evaluation microwave models as inputs, allow the compiler blend a program evaluation benefits to do electricity consumption evaluation, as well as generate trade-offs based upon power use SEO efficiency/code quantity restrictions to come up with code fitting the restrictions, considerably boosting very low power usage (Liu et al., 2019). Nevertheless, the CPS possesses the qualities of great scope of processing information, constant and also uninterrupted internet functioning of the device, as well as the operator is only able to conduct shut it, etc., and feedback is immediate to understand the dependability of CPS wearing real-time (Kumar et al., 2021; Prabhu et al., 2023).
Upon considering the aforementioned methodologies and their results, a new method has planned to develop in order to overcome the uncertainties faced.
The objective of this contribution is to provide an alternative introduction to dependability evaluation within the context of CPS, and also determine the effect that new data infrastructures and data might have on it. We intricate around the 3 main facets of CPS dependability: hardware dependability, software program dependability, along with man interaction's effect on dependability, and also go over the possibility of information (Kanthavel et al., 2022; Kumar et al., 2017). We more illustrate the key points of ours by means of instances of 2 popular CPS, smart factories, and smart buildings. We 1st start by offering a track record on CPS and also dependability evaluation. Machine learning now plays a crucial part in all research fields, including the detection of food adulteration (Zhou et al., 2019; Surya & Senthilselvi, 2020), the diagnosis of sickness (Surya & Senthilselvi, 2022; Gnana Sophia et al., 2023), and the determination of metal purity (Sankareswaran & Krishnan, 2022; Senthilselvi et al., 2020), among others.
3. Research Methods
Within the CPS process, the CPS application device is starting to be additional and much more crucial during the whole phone system, and yes, it is able to recognize numerous features that earlier depended on hardware to finish. CPS software program is primarily sent out within the actual physical coating, community level, and then program level of CPS. By realizing the encompassing powerful setting modifications, it could a lot better manage and judge the actual physical entities in CPS, present CPS uses to hold the qualities of complicated sent out methods.
Blockchain based CPS Considered In (Sreetha & Chitra, 2023; Amanullakhan et al., 2023). The CPS application device is attached to the info parts of every level with the transmission wedge.
It's a little manual disaster issue as hardware. Secure Violence Detection CPS Considered In (Anusha et al., 2023; Muthukumar et al., 2023). Nevertheless, so as to adjust to the working planet and also the brand-new requirements of owners, the CPS software program must be enhanced as well as taken care of. After the software program element info is customized, it'll stay away from introducing technique defects. A lot of software program dependability prediction literature has granted software application reliability prediction versions. Nevertheless, no matter if a software application's dependability is able to meet up with the dependability requirements of CPS application items have to be measured. Which means we've split the work of ours straight into satisfied and many.
3.1 ML based Dependability
ML within the dependability prediction of CPS as well as abstracts the application parts within the CPS process since the item of dependability evaluation is presented by this framework.
The entire procedure is split into four stages: The very first phase may be the comprehension stage of the CPS application phone: Before forecasting the dependability of the CPS program, we have to recognize the way the CPS software program is sent out to the device, put together with the
342
principle of CPS application structure, to much better comprehend the qualities on the disappointment sequence of CPS software, and also to discover reliable and suitable prediction version. The next phase is building the CPS dependability system education phase: based upon ML, create a dependability prediction version ideal for the disappointment sequence qualities of CPS application. ML is needed as being a modelling application to evaluate enough time sequence on the disappointment information on the CPS application. In line with the concept of least mistake, the fat variables are modified with the proposed algorithm. The 3rd phase is definitely the CPS application dependability system prediction phase: you use a skilled piece of equipment understanding how to foresee the CPS application.
Fig. 1. Dependability Analysis Architecture
The 4th phase will be the evaluation and also analysis of the prediction version: the evaluation of the dependability time period sequence prediction outcomes on the CPS program, and then comparability together with the guide version. The style and design notion on the algorithm is sorting all of the parts on the method based on the detailed importance of disappointment awareness as well as disappointment fee, make a portion queue, as well as start treating it as being a professional viewpoint version. ML is utilized to create an algorithm, and then numerous areas are successfully fused to attain a prediction on the method declaration.
Whenever a method malfunction is expected to take place, the marked concealed troubling areas are increased to enhance the dependability on the CPS. Dependability Analysis Architecture is shown in Fig. 1.
Typically, dependability has become resolved entirely for an actual fitness level.
Nevertheless, all through the period, devices that are being used have developed to cover phenomena which are of different natures, as well as the quantification, cannot of theirs be done within an equivalent fashion as it's for your actual physical components. While within hardware most of the Bathtub is followed by the components - Bt curve that details the likelihood of faults' occurrences, within a software application 1 must have a totally various method, as there's simply no bodily wreckage of position. Rather, for a software application, nearly all almost all of the troubles are thereafter the beginning period. Thus, the likelihood of faults' occurrences is connected towards the probability of utilizing specific functionalities as well as finding the issues as well as correspondingly dealing with them. Hardware dependability continues to be effectively identified as well as possesses a great theoretical history. Dependability of hardware pieces will be the likelihood which they do as anticipated for a specified length of your time.
3.2 Hardware & Software Dependability Analysis
While most dependability-connected procedures happen to be solidly identified around hardware, within the program they're currently relatively vague, particularly of the terminology of the quantification of theirs. Like hardware dependability, software program dependability is described as the chance which a program is going to work with no disappointment that costs less than chosen problems as well as for a specified time period. Software program dependability is regarded as a characteristic of a software application quality, maintainability, install ability, capability, serviceability, performance, usability, alongside functionality, and then a user manual.
343
Software program dependability examination is primarily associated with design and style mistakes, as well as, consequently, there's another method of it compared to the main typically employed for hardware. Software applications dependability is composed of the following 3 pursuits: Error avoidance, Fault detection as well as removing, as well as Measurements, to optimize dependability, therefore supporting the initial 2 pursuits. Thus, to enhance application dependability, sizable importance has to be positioned through the really start of the development of its, beginning in the demand’s specification stage. The sooner the dependability is encompassed, the taller it could possibly end up. Common tasks that focus on enhancing the dependability of a software application are debugging, premature mistake detection, quickly healing, static and dynamic evaluation, and then evolution. In comparison with hardware dependability, software program dependability can also be connected to several unquantifiable elements, like programmers' capabilities or maybe software program task managing abilities.
Within the situation of hardware, the abilities of employees who develop the hardware likewise material, therefore the look part is typical for each software and hardware. Equation 1 has explained in algorithm.
𝐷𝐴 = 𝐶𝑃𝑆(𝐷) + 𝑀𝐿
Dependability Analysis Algorithm:
For all CPS Components C Calculate the number of Devices D end For
Analyse the Dependability DA DA = CPS (D) + ML
if DA = 0, Analysis Done and no issues
then Continue the CPS Communication process else
Not repeat the analysis till it gets no issue end if
3.3 Dependability Analysis on Data Communication
Ease and availability of a group of information, don't have any merely yielded collections of completely new data types, but additionally requested the improvement of sophisticated and new ways to allow the complete advantage of all of the information. For instance, generally, the information gathered up is located in the type of precious time sequence, without explicitly recording faults' occurrences. This means that there's a top basic need for tactics that concentrate on occasion detection so that faults along with other events' occurrences will be obtained from time sequence information. In addition, correct real cause evaluation strategy is going to be the subsequent necessity, like to extract events' model and dependencies them. As soon as these methods are completely seasoned, dependability evaluation of methods is usually automated, including to get instantly carried out, based mostly on information via producing stuff. The simple fact that the majority of the production models aren't always safety-critical, along with faults/failures are fairly prevalent occurrences, tends to make the data-based procedures really sufficient. Group of information for dependability evaluation within safety-critical methods will be inconceivable, as in these devices the problems are able to cost you man life. Good examples are auto methods or even aircraft. The takes us to the next issue which supports the first. Our suggested program is going to satisfy this particular part for great interaction with CPS infrastructure.
4. Results and Discussions
The test utilizes the SLM simulation wedge, incorporated with Matlab ML program, as well as employs information category, redundancy test, as well as trend checking to begin a Smartphone. For that gotten method declare info, eighty percent of the information is utilized to instruct the category version, along with twenty percent of the information is utilized for oblivious tests. So as to do the redundancy test, the vector area design is initially used-to transform the past
344
as well as examination method suggests info situations directly into vector organizations. In Fig.
2 and Fig. 3, we have analysed the initial weight τ and learning rateγ.
Fig. 2. Initial Weight Dependability
The shifting regular procedure together with the exponential smoothing technique can also be widely used techniques for precious time sequence prediction. Utilizing these 2 techniques as guide versions are able to gauge the overall performance on the printer mastering time period sequence type within this paper: (I) Moving typical technique: The moving average technique is an approach to going through the moment sequence product by product, getting rid of little guideline switches within the time sequence, as well as setting up a fare mathematical design to disclose the long-range pattern switches of time series. (II) Exponential smoothing technique: The exponential smoothing prediction technique is a short-term period sequence prediction technique.
Fig. 3. Learning rate Dependability
It applies the basic principle of smoothing the typical to abstract the distinction within the amount of information sequence, as well as weights as well as smooththe historic data. The information info excludes the effect of irregular details and therefore reveals the fundamental pattern of expected item switches.
Fig. 4. Machine Learning Dependability Analysis
345
In Fig. 4 and Fig. 5, we have made ML and Exponential testing on dependability. we are able to get the realization of the test through the general prediction benefits, the real-time analysis way of the dependability of CPS software program based upon printer learning suggested within this newspaper is in contrast to the widely used precious time sequence to assess the moving typical Method along with exponential smoothing strategy are much better for real-time analysis.
Fig. 5. Exponential Testing on Dependability
5. Conclusion
First of all, the structure of a regular CPS application device is created, along with an era sequence prediction design according to ML dependability is suggested. Begin an education type for printer learning as well as confirm the precision on the product by way of experimental prediction information. The experimental outcomes reveal that ML designs together with the possibility to master lengthy observation sequences are definitely more precise wearing forecasting the dependability of CPS application. Another area mostly concentrates on CPS versions, implementation tools, and algorithms. Particularly, since the portion disaster, damage, or maybe practical wreckage that triggers the device to be unsuccessful is associated towards the topology and also framework of the device, the disappointment awareness of the very same aspect of devices with a variety of buildings isn't always similar. The method and method of acquiring empirical details additionally have to become additional strengthened. This particular newspaper studies the dependability of CPS as well as proposes an instant internet evaluation approach to CPS dependability based upon printer learning.
The next thing is focusing on CPS versions, implementation tools, and algorithms.
Particularly, when you consider the capability of an aspect of be unsuccessful because of functional degradation, loss, or component failure is connected with the topology and also framework of the device, the disappointment awareness of the very same aspect of devices with a variety of buildings isn't always similar. In addition, unreliable methods may additionally be harmful as well as insecure. Thus, the chance which is within the accessibility of information to far more effectively evaluate CPS's dependability has to be used. As a result, brand new data driven methods have to come through. This's particularly essential, as typically, dependability evaluation have been carried out depending to a terrific level on pro understanding.
References
Ahilan, A., & Jeyam, A. (2023). Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution. Wireless Personal Communications, 129(1), 549-567.
https://doi.org/10.1007/s11277-022-10110-8
Amanullakhan, M., Usha, M., & Ramesh, S. (2023). Intrusion Detection Architecture (IDA) In IOT Based Security System. International Journal of Computer and Engineering
Optimization, 01 (01), 33-42.
https://kitspress.com/journals/IJCEO/index.php?info=14&issue=25
346
Anusha, K., Lokesh, S., & Benila Christabel, T. (2023). Deep reinforcement learning based real time violence detection. International Journal of Data Science and Artificial Intelligence, 01(01), 33-40. https://kitspress.com/journals/IJDSAI/index.php?info=14&issue=5
Boursinos, D., & Koutsoukos, X. (2020). Assurance monitoring of cyber-physical systems with machine learning components. arXiv preprint arXiv:2001.
05014.https://doi.org/10.48550/arXiv.2001.05014
Castaño, F., Strzelczak, S., Villalonga, A., Haber, R. E., & Kossakowska, J. (2019). Sensor reliability in cyber-physical systems using internet-of-things data: A review and case study.
Remote sensing, 11(19), 2252. https://doi.org/10.3390/rs11192252
Chiu, M. C., Tsai, C. D., & Li, T. L. (2020). An integrative machine learning method to improve fault detection and productivity performance in a cyber-physical system. Journal of Computing and Information Science in Engineering, 20(2), 021009.
https://doi.org/10.1115/1.4045663
Fei, X., Shah, N., Verba, N., Chao, K. M., Sanchez-Anguix, V., Lewandowski, J., ... & Usman, Z. (2019). CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey. Future generation computer systems, 90, 435-450.
https://doi.org/10.1016/j.future.2018.06.042
Gnana Sophia, S., Thanammal K. K., & Sujatha, S. S. (2023). Secure storage of lung brain multi- modal medical images using DNA homomorphic encryption, International Journal of
Current Bio-Medical Engineering, 01, (01), 16-22.
https://kitspress.com/journals/IJCBE/index.php?info=14&issue=15
Gutierrez-Rojas, D., Ullah, M., Christou, I. T., Almeida, G., Nardelli, P., Carrillo, D., ... &
Kalalas, C. (2020, June). Three-layer approach to detect anomalies in industrial environments based on machine learning. In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS), 1, 250-256. IEEE. DOI:
10.1109/ICPS48405.2020.9274780
Hartsell, C., Mahadevan, N., Ramakrishna, S., Dubey, A., Bapty, T., Johnson, T., ... & Karsai, G.
(2019a). Model-based design for CPS with learning-enabled components. In Proceedings of the Workshop on Design Automation for CPS and IoT (pp. 1-9).
https://doi.org/10.1145/3313151.3313166
Hartsell, C., Mahadevan, N., Ramakrishna, S., Dubey, A., Bapty, T., Johnson, T., ... & Karsai, G.
(2019b). CPS Design with Learning-Enabled Components: A Case Study. In Proceedings of the 30th International Workshop on Rapid System Prototyping (RSP'19), 57-63.
https://doi.org/10.1145/3339985.3358491
Kanthavel, R., Dhaya, R., & Ahilan, A. (2022). AI-Based Efficient WUGS Network Channel Modeling and Clustered Cooperative Communication. ACM Transactions on Sensor Networks, 18(3). https://doi.org/10.1145%2F3469034
Khan, M. T., Serpanos, D., Shrobe, H., & Yousuf, M. M. (2020, September). Rigorous machine learning for secure and autonomous cyber physical systems. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, 1, 1815-1819. DOI: 10.1109/ETFA46521.2020.9212074
Kumar, S., Cengiz, K., Vimal, S., & Suresh, A. (2021). Energy efficient resource migration-based load balance mechanism for high traffic applications IoT. Wireless personal communications, 1-19. https://doi.org/10.1007/s11277-021-08269-7
Kumar, S., Gautam, K., Singhal, V., & Sharma, N. (2023). Cloud and deep learning-based image analyzer. Journal of Electronic Imaging, 32(2), 021602-021602.
https://doi.org/10.1117/1.JEI.32.2.021602
Kumar, S., Ranjan, P., Radhakrishnan, R., & Tripathy, M. R. (2017a). Energy efficient multichannel MAC protocol for high traffic applications in heterogeneous wireless sensor networks. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering), 10(3), 223-232.
https://doi.org/10.2174/2352096510666170601090202
Kumar, S., Ranjan, P., Ramaswami, R., & Tripathy, M. R. (2017b). Resource efficient clustering and next hop knowledge-based routing in multiple heterogeneous wireless sensor
347
networks. International Journal of Grid and High-Performance Computing (IJGHPC), 9(2), 1-20. DOI: 10.4018/IJGHPC.2017040101
Li, S., He, H., Li, J., Yin, P., & Wang, H. (2019, September). Machine learning algorithm-based battery modeling and management method: A Cyber-Physical System perspective. In 2019 3rd Conference on Vehicle Control and Intelligence (CVCI), IEEE, 1-4. DOI:
10.1109/CVCI47823.2019.8951635
Liu, G., Yang, H., Fu, Y., Mao, C., Xu, P., Hong, J., & Li, R. (2020). Cyber-physical system- based real-time monitoring and visualization of greenhouse gas emissions of prefabricated construction. Journal of Cleaner Production, 246, 119059.
https://doi.org/10.1016/j.jclepro.2019.119059
Liu, Y., Liu, A., Liu, X., & Ma, M. (2019). A trust-based active detection for cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics, 15(12), 6593-6603. DOI: 10.1109/TII.2019.2931394
Lv, Z., Han, Y., Singh, A. K., Manogaran, G., & Lv, H. (2020). Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Transactions on Industrial Informatics, 17(2), 1496-1504. DOI: 10.1109/TII.2020.2994747
Martins, J. P. S., Rodrigues, F. M., & Henriques, N. (2020). Modeling system based on machine learning approaches for predictive maintenance applications. KnE Engineering, 857-871.
DOI: 10.18502/keg. v5i6.7105
Mozaffari, F. S., Karimipour, H., & Parizi, R. M. (2020). Learning based anomaly detection in critical cyber-physical systems. Security of Cyber-Physical Systems: Vulnerability and Impact, 107-130. https://doi.org/10.1007/978-3-030-45541-5_6
Muthukumar, S., Hevin Rajesh, A., & Jenice Prabhu, D. (2023). Reduancy aware dynamic routing protocol using salp swarm optimization algorithm. International Journal of System Design
and Computing, 01, (01), 35-42.
https://kitspress.com/journals/IJSDC/index.php?info=14&issue=12
Pan, F., Pang, Z., Wen, H., Luvisotto, M., Xiao, M., Liao, R. F., & Chen, J. (2019). Threshold- free physical layer authentication based on machine learning for industrial wireless CPS.
IEEE Transactions on Industrial Informatics, 15(12), 6481-6491. DOI:
10.1109/TII.2019.2925418
Pham, B. T., Jaafari, A., Avand, M., Al-Ansari, N., Dinh Du, T., Yen, H. P. H., ... & Tuyen, T. T.
(2020). Performance evaluation of machine learning methods for forest fire modeling and prediction. Symmetry, 12(6), 1022. https://doi.org/10.3390/sym12061022
Prabhu, M., Muthu Kumar, B., & Ahilan, A. (2023). Slime Mould Algorithm based Fuzzy Linear CFO Estimation in Wireless Sensor Networks. IETE Journal of Research, 1-11.
https://doi.org/10.1080/03772063.2023.2194279
Sankareswaran, S. P., & Krishnan, M. (2022). Unsupervised end-to-end brain tumor magnetic resonance image registration using RBCNN: rigid transformation, B-spline transformation and convolutional neural network. Current Medical Imaging, 18(4), 387-397.
https://doi.org/10.2174/1573405617666210806125526
Senthilselvi, A., Sellam, V., Alahmari, S. A., & Rajeyyagari, S. (2020). Accuracy enhancement in mobile phone recycling process using machine learning technique and MEPH process. Environmental Technology & Innovation, 20, 101137.
https://doi.org/10.1016/j.eti.2020.101137
Shengdong, M., Zhengxian, X., & Yixiang, T. (2019). Intelligent traffic control system based on cloud computing and big data mining. IEEE Transactions on Industrial Informatics, 15(12), 6583-6592. DOI: 10.1109/TII.2019.2929060
Sigamani, R. M. S. (2020). Adoption of Machine Learning with Adaptive Approach for Securing CPS. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security (pp. 388-415). IGI Global. DOI: 10.4018/978-1-5225-9611-0.ch018
Sreetha, G., & Chitra, T. V. Block Chain Assisted Cloud Based Medical Data Storage Via Quantum Diffie-Hellman Key Exchange. International Journal of Computer and
Engineering Optimization, 01(01), 01-09, 2023.
https://kitspress.com/journals/IJCEO/index.php?info=14&issue=21
348
Surya, V., & Senthilselvi, A. (2020). A qualitative analysis of the machine learning methods in food adultery: a focus on Milk adulteration detection. J Adv Res Dyn Control Syst, 12(7), 543-551.
Surya, V., & Senthilselvi, A. (2022). Identification of oil authenticity and adulteration using deep long short-term memory-based neural network with seagull optimization algorithm. Neural Computing and Applications, 1-15. https://doi.org/10.1007/s00521-021-06829-3
Therase, J., Allwin, S., & Ahilan, A. (2023). Full Duplex Media Access Control Protocol for Multihop Network Computing. Computer Systems Science & Engineering, 44(1).
https://doi.org/10.32604/csse.2023.023515
Usha, M., Mahalingam, T., Ahilan, A., & Sathiamoorthy, J. (2023). EOEEORFP: Eagle Optimized Energy Efficient Optimal Route-Finding Protocol for Secure Data Transmission in FANETs. IETE Journal of Research, DOI: 10.1080/03772063.2023.2253777
Wang, D., Wang, X., Zhang, Y., & Jin, L. (2019). Detection of power grid disturbances and cyber- attacks based on machine learning. Journal of information security and applications, 46, 42-52. https://doi.org/10.1016/j.jisa.2019.02.008
Yu, J. J., Kim, D. W., Lee, E. J., & Son, S. W. (2020). Determining the optimal number of ground control points for varying study sites through accuracy evaluation of unmanned aerial system-based 3D point clouds and digital surface models. Drones, 4(3), 49.
https://doi.org/10.3390/drones4030049
Zhang, Y., Chu, L., Ou, Y., Guo, C., Liu, Y., & Tang, X. (2019). A cyber-physical system-based velocity-profile prediction method and case study of application in plug-in hybrid electric vehicle. IEEE transactions on cybernetics, 51(1), 40-51. DOI:
10.1109/TCYB.2019.2928945
Zhou, C., Luo, H., Fang, W., Wei, R., & Ding, L. (2019). Cyber-physical-system-based safety monitoring for blind hoisting with the internet of things: A case study. Automation in construction, 97, 138-150. https://doi.org/10.1016/j.autcon.2018.10.017