International Journal of Network Dynamics and Intelligence
https://w3.sciltp.com/journals/ijndi
<p>International Journal of Network Dynamics and Intelligence (IJNDI) is an international, peer-reviewed, Open Access and academic journal, aiming to publish articles describing recent fundamental contributions in the field of network dynamics and network intelligence. Theory, practice, and applications are the essential topics being covered.</p>Scilight Pressen-USInternational Journal of Network Dynamics and Intelligence2653-6226Security Coordination Control for the Belt Conveyor Systems with False Data Injection Attacks
https://w3.sciltp.com/journals/ijndi/article/view/964
<p class="categorytitle"><em>Article</em></p> <h1>Security Coordination Control for the Belt Conveyor Systems with False Data Injection Attacks</h1> <div class="abstract_title"> <p><strong>Lei Ma <sup>1,2</sup>, Hao Zhang <sup>1,2</sup>, Guoqing Wang <sup>1,2</sup>, Chunyu Yang <sup>1,2,</sup>*, and Linna Zhou <sup>1,2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1</sup> School of Information and Control Engineering, China University of Mining and Technology, Xuzhou 221116, China</p> <p><sup>2</sup> Xuzhou Coal Mining Group Co., Ltd, Xuzhou 221116, China</p> <p><sup>*</sup> Correspondence: E-mail: chunyuyang@cumt.edu.cn</p> </div> <div class="abstract_top"> <p>Received: 30 July 2024</p> <p>Accepted: 11 October 2024</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> This paper addresses the issue of security coordination control for belt conveyor systems (BCSs) vulnerable to false data injection (FDI) attacks in an industrial Internet of Things scenario. A networked BCSs drive model is established for the first time consisting of flexibly connected dual permanent magnet synchronous motors. Subsequently, a novel security control strategy based on quadratic regulators is proposed to preserve the drive motor synchronization in response to FDI attacks that compromise the signal interaction from sensors to controllers. Afterward, a composite sub-optimal security coordination controller is presented based on the singular perturbation theory and the corresponding solution approach, recognizing the two-time-scale dynamics inherent to motor systems. The proposed criteria both eliminate ill-conditioned numerical issues and assure system stability. Furthermore, simulations exhibit the advantages and physical experiments confirm the efficiency of the developed algorithms.</p>Lei MaHao ZhangGuoqing WangChunyu YangLinna Zhou
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000110000110.53941/ijndi.2025.100001Concatenated Vector Representation with the Asymmetric GloVe Model
https://w3.sciltp.com/journals/ijndi/article/view/965
<p class="categorytitle"><em>Article</em></p> <h1>Concatenated Vector Representation with the Asymmetric GloVe Model</h1> <div class="abstract_title"> <p><strong>Junfeng Shi <sup>*</sup>, and Jihong Li</strong></p> </div> <div class="abstract_top"> <p>School of Modern Educational Technology, Shanxi University, Taiyuan 030006, China</p> <p><sup>*</sup> Correspondence: sjf@sxu.edu.cn</p> </div> <div class="abstract_top"> <p>Received: 7 November 2023</p> <p>Accepted: 31 December 2023</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> The GloVe model is a widely used model for word vector representation learning. The word vector trained by the model can encode some semantic and syntactic information, and the conventional GloVe model trains the word vector representation by collecting the context word within a symmetric window for a given target word. Obviously, such collection does not obtain the left/right side information between the context word and the target word, which is linguistically critical information for learning a word representation of syntactic information. Therefore, the word vector trained by the GloVe model performs poorly in syntax-based tasks such as the part-of-speech tagging task (abbreviated as the POS task) and the chunking task. In order to solve this problem, a concatenated vector representation is proposed with the asymmetric GloVe model, which distinguishes left contexts from right contexts of the target word and exhibits more syntactic similarity than the original GloVe vector representation in looking for the target word’s neighbor words. By using the syntactic test set, the concatenated vector representation performs well for the word analogy task, and the syntax-based tasks such as the POS task and the chunking task. At the same time, the dimension of the concatenated vector representation is the half dimension of the original GloVe vector representation, reducing the running time greatly.</p>Junfeng ShiJihong Li
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000210000210.53941/ijndi.2025.100002Torus-Event-Based Sliding Mode Control for Networked Interval Type-2 Fuzzy Systems Under Deception Attacks
https://w3.sciltp.com/journals/ijndi/article/view/966
<p class="categorytitle"><em>Article</em></p> <h1>Torus-Event-Based Sliding Mode Control for Networked Interval Type-2 Fuzzy Systems Under Deception Attacks</h1> <div class="abstract_title"> <p><strong>Xingwang Liu <sup>1</sup>, Zhi Ling <sup>2,*</sup>, and Yang Zhang <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1</sup> College of Electrical and Power Engineering, Taiyuan University of Technology, Taiyuan 030024, China</p> <p><sup>2</sup> School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China</p> <p><sup>*</sup> Correspondence: Lingzhi@njust.edu.cn</p> </div> <div class="abstract_top"> <p>Received: 21 November 2023</p> <p>Accepted: 29 June 2024</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> In this paper, the security control problem is investigated for the discrete networked interval type-2 (IT2) fuzzy system under limited communication resources. A torus-event-triggering protocol is developed via two thresholds to regulate the transmission of data, ensuring avoiding the transmission of abnormal data. The deception attacks considered are assumed to have the ability of injecting false information into the data transmitted between sensor and controller. By constructing the new membership functions, a security sliding mode controller is proposed and the theoretical analysis proves that the stochastic stability of the closed-loop system and the reachability of the prescribed sliding surface can be guaranteed. Finally, an illustrative numerical example is proposed to demonstrate the effectiveness of the proposed control strategy.</p>Xingwang LiuZhi LingYang Zhang
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000310000310.53941/ijndi.2025.100003Privacy-Preserving Distributed Entropy Filtering for Microgrids With Innovation Decomposition
https://w3.sciltp.com/journals/ijndi/article/view/968
<p class="categorytitle"><em>Article</em></p> <h1>Privacy-Preserving Distributed Entropy Filtering for Microgrids With Innovation Decomposition</h1> <div class="abstract_title"> <p><strong>Yan Liang <sup>1</sup>, Yangkai Chen <sup>2</sup>, Dengfeng Pan <sup>3,*</sup>, and Haifang Song <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1</sup> Business School, University of Shanghai for Science and Technology, Shanghai 200093, China</p> <p><sup>2</sup> Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China</p> <p><sup>3</sup> School of Engineering, Swinburne University of Technology, Melbourne, VIC 3122, Australia</p> <p><sup>*</sup> Correspondence: dengfengpan@swin.edu.au</p> </div> <div class="abstract_top"> <p>Received: 31 December 2024</p> <p>Accepted: 11 March 2025</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> Data leakage and cyberattacks are usually inevitable due mainly to the vulnerability of deployed communication networks. The paper proposes a distributed privacy-preserving filter based on the maximum correlation criteria for microgrids. An improved distributed structure is first constructed via adding decomposed innovation from neighbors in update steps. Then, an improved version of the maximum correntropy criterion is defined to evaluate the local filtering performance as well as the consensus performance by adding an innovation-related term. In light of fixed-point iterations and the adopted filter structure, the desired filter gains are obtained recursively by optimizing the proposed index. Furthermore, the profound analysis is performed to disclose that the filtering covariance of external eavesdroppers is larger than target-side filters and hence the privacy of the microgrids can be protected. Finally, an example is exploited to verify its effectiveness.</p>Yan LiangYangkai ChenDengfeng PanHaifang Song
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000410000410.53941/ijndi.2025.100004Linear State Estimation for Multi-rate NCSs With Multi-channel Observation Delays and Unknown Markov Packet Losses
https://w3.sciltp.com/journals/ijndi/article/view/969
<p class="categorytitle"><em>Highlights</em></p> <h1>Linear State Estimation for Multi-rate NCSs With Multi-channel Observation Delays and Unknown Markov Packet Losses</h1> <div class="abstract_title"> <p><strong>Zhenglu Sun and Chunyan Han <sup>*</sup></strong></p> </div> <div class="abstract_top"> <p>School of Electrical Engineering, University of Jinan, Jinan, 250022, China</p> <p><sup>*</sup> Correspondence: cyhan823@hotmail.com</p> </div> <div class="abstract_top"> <p>Received: 19 October 2023</p> <p>Accepted: 27 November 2024</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> This paper is concerned with the linear minimum mean square error estimation (LMMSE) for the multi-rate sampling systems with multi-channel observation delays and unknown Markovian packet losses. The original system is firstly transformed into a single-rate jumping parameter system with multi-channel and delay-free observations by employing the lifting technique and introducing a set of reorganized observations and Markov chains. Then, the single-rate system is converted into a general linear system without delays by defining a new group of extended states. Based on the innovation analysis method, a liner minimum mean square error estimator is developed, and the estimator gain is obtained in terms of generalized Riccati difference equations based on a set of coupled Lyapunov equations. Therefore, the original state estimation problem is solved via the jumping parameter property. Finally, the convergence of the Riccati equation is analyzed and a stationary filter is obtained. The novelty of this paper lies in the introduction of the reorganized observations and multi-state Markov chains.</p>Zhenglu SunChunyan Han
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000510000510.53941/ijndi.2025.100005Real-Time Semantic Segmentation of Road Scenes via Hybrid Dilated Grouping Network
https://w3.sciltp.com/journals/ijndi/article/view/972
<p class="categorytitle"><em>Article</em></p> <h1>Real-Time Semantic Segmentation of Road Scenes via Hybrid Dilated Grouping Network</h1> <div class="abstract_title"> <p><strong>Yan Zhang <sup>1</sup>, Xuguang Zhang <sup>1,*</sup>, Deting Miao <sup>1</sup>, and Hui Yu <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1</sup> School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, Zhejiang, China</p> <p><sup>2</sup> cSCAN, University of Glasgow, G12QB, United Kingdom</p> <p><sup>*</sup> Correspondence: zhangxuguang78@163.com</p> </div> <div class="abstract_top"> <p>Received: 10 January 2024</p> <p>Accepted: 23 April 2024</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> Real-time semantic segmentation is a critical step for various real-world application scenarios such as autonomous driving systems. How to achieve a high accuracy while keeping a high inference speed has become a challenging issue for real-time semantic segmentation. To tackle this challenge, we propose a Hybrid Dilated Grouping Network (HDGNet) for real-time semantic segmentation of outdoor scenes in this study, which not only improves the accuracy of image segmentation, but also considers the inference speed. To reduce model parameters to speed up inference, we propose to use factorization convolution to replace ordinary two-dimensional convolution. However, simply reducing the amount of model parameters may sacrifice segmentation accuracy. We thus further introduce dilated convolution to extract multi-scale spatial information. The HDG module is constructed by combining factorization convolution and dilated convolution, which not only reduces the model parameters and improves the model inference speed, but also extracts local and more contextual information. And furthermore, to enhance the feature expression ability of the network, we introduce a channel attention mechanism to capture the information interaction between channels. After obtaining the shallow features and deep high-level semantic information, we design the skip layer connections to fuse the feature branches from different stages to improve the segmentation accuracy. The experiments conducted on the widely used datasets show that the proposed model achieves superior real-time performance over existing methods but using significantly fewer model parameters.</p>Yan ZhangXuguang ZhangDeting MiaoHui Yu
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000610000610.53941/ijndi.2025.100006Basic theories and methods of target's height and distance measurement based on monocular vision
https://w3.sciltp.com/journals/ijndi/article/view/977
<p class="categorytitle"><em>Article</em></p> <h1>Basic theories and methods of target’s height and distance measurement based on monocular vision</h1> <div class="abstract_title"> <p><strong>Jiafa Mao <sup>1,</sup>*, and Lu Zhang <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1</sup> College of Computer Science and Technology, ZheJiang University of Technology, ZheJiang, Hang Zhou 310023, China</p> <p><sup>2</sup> China Telecom Hangzhou, Hangzhou 311121, China</p> <p><sup>*</sup> Correspondence: maojiafa@zjut.edu.cn</p> </div> <div class="abstract_top"> <p>Received: 23 December 2023</p> <p>Accepted: 28 June 2024</p> <p>Published: 25 March 2025</p> </div> <p><strong id="abstract" class="label">Abstract:</strong> The existing object tracking, localization, measurement, and other technologies mostly concentrate on dual cameras or using single camera plus the non-visual sensor technology. These technologies are achieved by increasing the amount of data at the expense of lowing the processing speed to achieve precise localization of machine vision. If machine vision localization can be achieved without increasing the amount of data processing, then only the monocular ranging method can be used. Therefore, monocular ranging is obviously more challenging in actual research. Motivated by this, this paper proposes a novel object learned method based on monocular vision. According to the geometric model of camera imaging and the basic principle of converting analog signals to digital signals, we derive the relationship model between the object distance, object height, camera height, image resolution, image target size, and camera parameters. We theoretically prove the infinite solvability of “self-invariance” and the solvability of “self-change”, which provides a theoretical basis for the object tracking, localization and measurement based on monocular vision. The experimental results show the correctness of our theory.</p>Jiafa MaoLu Zhang
Copyright (c) 2025 by the authors.
https://creativecommons.org/licenses/by/4.0/
2025-03-252025-03-2510000710000710.53941/ijndi.2025.100007