Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of digital twins: applications, technologies and security challenges
SR Jeremiah, A El Azzaoui, NN **ong… - Journal of Systems …, 2024 - Elsevier
ABSTRACT Alongside advancements in Artificial Intelligence (AI), significant progress has
been made in big data processing, edge/cloud computing, and ubiquitous computing in the …
been made in big data processing, edge/cloud computing, and ubiquitous computing in the …
[HTML][HTML] Risk related to AGV systems—Open-access literature review
AGV systems are considered a necessary element of the recently created cyber-physical
systems whose task is to support material flows in intelligent factories. The implementation of …
systems whose task is to support material flows in intelligent factories. The implementation of …
DRL-GAT-SA: Deep reinforcement learning for autonomous driving planning based on graph attention networks and simplex architecture
Y Peng, G Tan, H Si, J Li - Journal of Systems Architecture, 2022 - Elsevier
Self-driving cars need to make decisions while sharing the road with human drivers whose
behavior is uncertain. However, the presence of uncertainty leads to a trade-off between two …
behavior is uncertain. However, the presence of uncertainty leads to a trade-off between two …
[HTML][HTML] Identification of differential drive robot dynamic model parameters
The paper presents the identification process of the mathematical model parameters of a
differential-drive two-wheeled mobile robot. The values of the unknown parameters of the …
differential-drive two-wheeled mobile robot. The values of the unknown parameters of the …
Digital twin in industry 4.0 and beyond applications
The digital twin is the replica of the real world in the virtual environment, which is fed with
real-time data and information. This replica can be used as a virtual copy of any field of any …
real-time data and information. This replica can be used as a virtual copy of any field of any …
[HTML][HTML] ATTEST: Automating the review and update of assurance case arguments
FU Muram, MA Javed - Journal of systems architecture, 2023 - Elsevier
The assurance case arguments are created to demonstrate acceptable system safety and/or
security. In this regard, a series of propositions expressed by natural language statements …
security. In this regard, a series of propositions expressed by natural language statements …
[PDF][PDF] Risk analysis in internal transport: An evaluation of occupational health and safety using the Fine-Kinney method
The imperatives of occupational health and safety (OHS) are increasingly recognised as
critical components of business operations, particularly within logistics where manual tasks …
critical components of business operations, particularly within logistics where manual tasks …
[HTML][HTML] Systematic review on contract-based safety assurance and guidance for future research
S Kanwal, FU Muram, MA Javed - Journal of Systems Architecture, 2024 - Elsevier
The safety requirements are often described via specifications called contracts. To verify that
the system fulfills certain safety requirements, for instance, in the assume-guarantee contract …
the system fulfills certain safety requirements, for instance, in the assume-guarantee contract …
[HTML][HTML] Exploiting the technological capabilities of autonomous vehicles as assembly items to improve assembly performance
T Kathmann, D Reh, JC Arlinghaus - Advances in Industrial and …, 2023 - Elsevier
The automotive industry is on the brink of transitioning to autonomous vehicles (AVs). This
will require highly flexible assembly systems. This paper focuses on exploiting the …
will require highly flexible assembly systems. This paper focuses on exploiting the …
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system
L Yin, J Xu, C Wang, Q Wang, F Zhou - Journal of Systems Architecture, 2023 - Elsevier
The in-vehicle voltage-based intrusion detection system (VIDS) can recognize the identity of
the ECUs and detect the physical layer attacks that cannot be detected by the content-based …
the ECUs and detect the physical layer attacks that cannot be detected by the content-based …