98%
921
2 minutes
20
To mitigate the impact of network security on the production environment in the industrial internet, this paper proposes a confidence rule-based security assessment model for the industrial internet that uses selective modeling. First, a definition of selective modeling tailored to the characteristics of the industrial internet is provided. Based on this, the assessment process of the Selectable Belief Rule Base (BRB-s) model is introduced. Then, in combination with the Selection covariance matrix adaptive evolution strategy (S-CMA-ES) algorithm, a parameter optimization method for the BRB-s model is designed, which expands the selective constraints on expert knowledge. This model establishes a better unidirectional selection strategy among different subgroups, and while expanding the selection constraints on expert knowledge, it achieves better evaluation results. This effectively addresses the issue of reduced modeling accuracy caused by insufficient data and poor data quality. Finally, the experiments of different evaluation models on industrial data sets are compared, and good results are obtained, which verify the evaluation accuracy of the industrial Internet network security situation assessment model proposed in this paper and the feasibility and effectiveness of the S-CMA-ES optimization algorithm.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11644398 | PMC |
http://dx.doi.org/10.3390/s24237577 | DOI Listing |
IEEE Trans Neural Netw Learn Syst
September 2025
Accurate imputation of missing data is crucial in the Industrial Internet-of-Things (IIoT), where operations are often compromised by noisy samples from harsh environments. Traditional imputation methods struggle with such noise due to their black-box nature or lack of adaptability. To address this issue, we recast data imputation as a distribution alignment challenge, utilizing the flexibility of optimal transport (OT) to handle noisy samples.
View Article and Find Full Text PDFCompr Rev Food Sci Food Saf
September 2025
Department of Life Science (Food Science and Technology Division), GITAM University, Visakhapatnam, Andhra Pradesh, India.
Drying is a critical unit operation in food processing, essential for extending shelf life, ensuring microbial safety, and preserving the nutritional and sensory attributes of food products. However, conventional convective drying techniques are often energy-intensive and lead to undesirable changes such as texture degradation, loss of bioactive compounds, and reduced product quality, thereby raising concerns regarding their sustainability and efficiency. In response, recent advancements have focused on the development of innovative drying technologies that offer energy-efficient, rapid, and quality-preserving alternatives.
View Article and Find Full Text PDFF1000Res
September 2025
Departamento de Ciencias Administrativas, Instituto Tecnológico Metropolitano, Medellín, Colombia.
Background: The automation of processes and services has transformed various industries, including the restaurant sector. Technologies such as the Internet of Things (IoT), machine learning, Radio Frequency Identification (RFID), and big data have been increasingly adopted to enhance service delivery, improve user experiences, and enable data traceability. By collecting user feedback and analyzing sentiments, these technologies facilitate decision-making and offer predictive insights into future food preferences.
View Article and Find Full Text PDFSci Rep
September 2025
Fukushima Renewable Energy Institute, National Institute of Advanced Industrial Science and Technology (AIST), Fukushima, 9630298, Koriyama, Japan.
The increasing adoption of the Internet of Things (IoT) in energy systems has brought significant advancements but also heightened cyber security risks. Virtual Power Plants (VPPs), which aggregate distributed renewable energy resources into a single entity for participation in energy markets, are particularly vulnerable to cyber-attacks due to their reliance on modern information and communication technologies. Cyber-attacks targeting devices, networks, or specific goals can compromise system integrity.
View Article and Find Full Text PDFPLoS One
September 2025
Department of Advanced Industry Fusion, Konkuk University, Seoul, Republic of Korea.
The proliferation of online gambling platforms has heightened concerns over their potential to intensify problematic gambling behaviors. While previous research has examined various risk factors, the influence of prior online gaming experience on gambling transitions remains underexplored. This study investigates whether and how engagement with online gaming facilitates the migration from offline to online gambling.
View Article and Find Full Text PDF