Saïd Amari
YOU?
Author Swipe
View article: Performance evaluation and reconfiguration of supply chains based on discrete event systems formalisms
Performance evaluation and reconfiguration of supply chains based on discrete event systems formalisms Open
This paper addresses the time performance evaluation of supply chains, modeled by a class of uncertain timed discrete event systems, known as timed automata with guards. The contributions of this work introduce a novel approach to performa…
View article: Distributed fault-tolerant control approach for discrete event systems using timed automata with guards: application to an electric power network
Distributed fault-tolerant control approach for discrete event systems using timed automata with guards: application to an electric power network Open
This paper proposes a new distributed Fault-Tolerant Control (FTC) method for discrete event systems based on timed automata with guards (TAGs) and min-plus algebra. The principle is to design FTC for subsystems that are synchronised by a …
View article: EDK-LEACH: improving LEACH protocol-based machine learning in wireless sensor networks
EDK-LEACH: improving LEACH protocol-based machine learning in wireless sensor networks Open
In wireless sensor networks (WSNs), many sensor devices are spread throughout the environment with the goal of collecting data and sending them to a base station (BS) for further studies. The issue of their limited battery power has arouse…
View article: Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets
Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets Open
Cyber-Physical Systems (CPS) brought connectivity to factories, and with connectivity comes a risk of cyber attack. CPSs are vulnerable to malicious attacks in which an attacker is inserted between a process and its control unit. Some pape…
View article: Robust Stealthy Attacks Based on Uncertain Costs and Labeled Finite Automata With Inputs
Robust Stealthy Attacks Based on Uncertain Costs and Labeled Finite Automata With Inputs Open
International audience
View article: Costs analysis of stealthy attacks with bounded output synchronized Petri nets
Costs analysis of stealthy attacks with bounded output synchronized Petri nets Open
International audience
View article: Modelling and temporal evaluation of networked control systems using timed automata with guards and (max,+) algebra
Modelling and temporal evaluation of networked control systems using timed automata with guards and (max,+) algebra Open
International audience
View article: Active Fault-Tolerant Control of Timed Automata with Guards
Active Fault-Tolerant Control of Timed Automata with Guards Open
International audience
View article: Active Fault-Tolerant Control of Timed Automata with Guards
Active Fault-Tolerant Control of Timed Automata with Guards Open
In this paper, an approach for active fault-tolerant control of discrete event systems modeled by timed automata with guards is proposed. Time is essential to detect some faults, and will be used as a criterion to select the control law. A…
View article: Analysis of timed automata with guards in dioids algebra
Analysis of timed automata with guards in dioids algebra Open
International audience