the description of the basic principles embodied in the concept of "Industry 4.0" and the possibility of their use in the development of measures aimed at increasing intelligence of modern control system of ...
详细信息
the description of the basic principles embodied in the concept of "Industry 4.0" and the possibility of their use in the development of measures aimed at increasing intelligence of modern control system of thermal power plants (TPP) the results of the analysis of the level of intelligence and efficiency of modern control system on the basis of program-technical complexes (PTC). It is shown that, despite the widespread introduction of modern PTC in the construction of new and modernization of existing ACSTPs of TPP, the improvement of the quality of technological processes, optimization of their modes and parameters, occurs mainly at the level of equipment and power unit and to a much lesser extent - at the level of power plants and as a resultan insufficient level of automation and low technical and economic efficiency. Another conclusion from the analysis - when implementing control algorithms in automated process control systems based on modern PTC, their wide information and software capabilities are not fully used. the main ways of further improvement of ACSTPs in order to increase their efficiency and the level of intelligence of ACSTPs of power plants based on PTC are given the assessment of the level of increase in intelligence and economic effect from the implementation of the proposed solutions is given. (C) 2021 the Authors. Published by Elsevier B.V.
the rapid evolution in web applications and software development has not witnessed a similar pace in development opposite what has taken place in the security and cybersecurity arenas. Web applications security has be...
详细信息
ISBN:
(纸本)9781665433518
the rapid evolution in web applications and software development has not witnessed a similar pace in development opposite what has taken place in the security and cybersecurity arenas. Web applications security has become a significant issue since insecure applications and software undermine various areas including finance, health care, defense, and other mission critical infrastructures. Web application vulnerability results from misconfiguration, flaws in the design, implementation, operation, or management at the different levels of a web application (input side, output side, or both sides). this taxonomy paper studies web vulnerabilities, their impact on users' infrastructures, and their detection tools (static, dynamic, or hybrid) and mitigation mechanisms at different software architecture levels.
Model-based System Engineering (MBSE) is proved an effective way to develop complex systems, and lots of MBSE methods/tools have been developed in recent years. Lack of deep analysis of mainstream MBSE methods/tools a...
详细信息
the article analyzes the existing approaches and software tools for popularizing Internet resources using external ranking factors. As the analysis showed, today there is a lot of software that provides tools for auto...
详细信息
the proceedings contain 91 papers. the special focus in this conference is on international Congress on Information and Communication Technology. the topics include: 5G Stand-Alone Test Bed for Craft Businesses and Sm...
ISBN:
(纸本)9789819932351
the proceedings contain 91 papers. the special focus in this conference is on international Congress on Information and Communication Technology. the topics include: 5G Stand-Alone Test Bed for Craft Businesses and Small or Medium-Sized Enterprises;cryptography in Latvia: Academic Background Meets Political Objectives;exploring Out-of-Distribution in Image Classification for Neural Networks Via Concepts;Robust GNSS/Visual/Inertial Odometry with Outlier Exclusion and Sensor’s Failure Handling;Clinical Nurses Before and After Simulated Postoperative Delirium Using a VR Device Characteristics of Postoperative Delirium Imagery;Modeling and Simulation of a Frequency Reconfigurable Circular Microstrip Antenna Using PIN Diodes;online Protection for Children Using a Developed Parental Monitoring Tool;12 bit 1 ps Resolution Time-to-Digital Converter for LSI Test System;Society 5.0 A Vision for a Privacy and AI-Infused Human-Centric Society Driving a New Era of Innovation and Value Creation;development and Applications of Data Mining in Healthcare Procedures and Prescribing Patterns in Government Subsidized Welfare Programs;Systematic Review and Propose an Investment Type Recommender System Using Investor’s Demographic Using ANFIS;i Am Bot the "Fish Finder": Detecting Malware that Targets Online Gaming Platform;the Application of Remote Sensing and GIS tools in Mapping of Flood Risk Areas in the Souss Watershed Morocco;computational analysis of a Mobile Path-Planning via Quarter-Sweep Two-Parameter Over-Relaxation;integrating IoT Sensors to Setup a Digital Twin of a Mixed Model Stochastic System for Real-Time Monitoring;deep Learning-Based Multi-task Approach for Neuronal Cells Classification and Segmentation;construction Scheme of Innovative European Urban Digital Public Health Security System Based on Fuzzy Logic, Spectrum analysis, and Cloud Computing;knowledge Graph Generation from Model Images.
the proceedings contain 91 papers. the special focus in this conference is on international Congress on Information and Communication Technology. the topics include: 5G Stand-Alone Test Bed for Craft Businesses and Sm...
ISBN:
(纸本)9789819930425
the proceedings contain 91 papers. the special focus in this conference is on international Congress on Information and Communication Technology. the topics include: 5G Stand-Alone Test Bed for Craft Businesses and Small or Medium-Sized Enterprises;cryptography in Latvia: Academic Background Meets Political Objectives;exploring Out-of-Distribution in Image Classification for Neural Networks Via Concepts;Robust GNSS/Visual/Inertial Odometry with Outlier Exclusion and Sensor’s Failure Handling;Clinical Nurses Before and After Simulated Postoperative Delirium Using a VR Device Characteristics of Postoperative Delirium Imagery;Modeling and Simulation of a Frequency Reconfigurable Circular Microstrip Antenna Using PIN Diodes;online Protection for Children Using a Developed Parental Monitoring Tool;12 bit 1 ps Resolution Time-to-Digital Converter for LSI Test System;Society 5.0 A Vision for a Privacy and AI-Infused Human-Centric Society Driving a New Era of Innovation and Value Creation;development and Applications of Data Mining in Healthcare Procedures and Prescribing Patterns in Government Subsidized Welfare Programs;Systematic Review and Propose an Investment Type Recommender System Using Investor’s Demographic Using ANFIS;i Am Bot the "Fish Finder": Detecting Malware that Targets Online Gaming Platform;the Application of Remote Sensing and GIS tools in Mapping of Flood Risk Areas in the Souss Watershed Morocco;computational analysis of a Mobile Path-Planning via Quarter-Sweep Two-Parameter Over-Relaxation;integrating IoT Sensors to Setup a Digital Twin of a Mixed Model Stochastic System for Real-Time Monitoring;deep Learning-Based Multi-task Approach for Neuronal Cells Classification and Segmentation;construction Scheme of Innovative European Urban Digital Public Health Security System Based on Fuzzy Logic, Spectrum analysis, and Cloud Computing;knowledge Graph Generation from Model Images.
this study explores techniques for modulating the threshold voltage of metal oxide semiconductor field-effect devices. the threshold voltage is a critical characteristic of these transistors. Our analysis examines the...
详细信息
ISBN:
(数字)9798331531812
ISBN:
(纸本)9798331531829
this study explores techniques for modulating the threshold voltage of metal oxide semiconductor field-effect devices. the threshold voltage is a critical characteristic of these transistors. Our analysis examines the factors influencing this parameter and proposes efficient strategies for its adjustment. To validate these approaches, we designed and simulated an n-channel device using computer-aided tools, with tests conducted at a temperature of 0 °C. the findings demonstrate the efficacy of the proposed methods in fine-tuning transistor behavior.
the experience of wide use of stepper motors as drives is considered and investigated. the main goal of this research is the development of technical and algorithmic toolsthat implement information technology to dete...
详细信息
systemsthat utilise biological data typically necessitate a module withthe capacity to analyse biomedical data. this article investigates the problem at the specified location and outlines the potential solutions at...
systemsthat utilise biological data typically necessitate a module withthe capacity to analyse biomedical data. this article investigates the problem at the specified location and outlines the potential solutions at our disposal. then, we'll examine the deployed technology. this technology has the potential to be bundled as a container for a microservice architecture and provides data analysis capabilities. Each module must contain fundamental features and capabilities, such as fuzzy machine learning and data mining methods. Similarly, this component must be able to generate an accurate report based on the results of its analysis. the primary benefit of such a system is its modularity, which enables quick adaptations and expansion for various data types, as well as simpler adaptation of the modules to newer technologies.
the decarbonization of cement industry will require a versatile portfolio of different alternative cements. In contrast to other known and popular alternatives, cements based on MgO-rich hydrates remain unexplored top...
详细信息
暂无评论