Cloud computing is a technology that gives a convenient and on-demand access to the different services through a shared pool of configurable computing resources. This technology raises concerns about the movement of d...
详细信息
ISBN:
(纸本)9781467344159
Cloud computing is a technology that gives a convenient and on-demand access to the different services through a shared pool of configurable computing resources. This technology raises concerns about the movement of data and control into a third party's control sphere. In this paper cloud security concerns and security requirements are addressed. Hypothetical cloud architecture and best practices for cloud security are proposed.
A fuzzy supervisor for a conventional PID controller is described. In the design of the supervisor, expert knowledge is applied to tune the parameters of the controller. A performance index is formulated, which matche...
详细信息
A fuzzy supervisor for a conventional PID controller is described. In the design of the supervisor, expert knowledge is applied to tune the parameters of the controller. A performance index is formulated, which matches the requirements in real applications better than the integral criteria generally used. In a simulation setup, system performances of the PID controller with and without the fuzzy supervisor are compared for different values of the parameters of the process to be controlled. The system with the fuzzy supervisor showed a far superior performance.
Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and...
详细信息
ISBN:
(纸本)9781509047673
Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and addressable smart things posing the capability to interact and communicate with other smart things. Every smart object consists of a microprocessor, transceiver module, sensors and power source. Most of the times these systems have to deal with low power and lossy networks (LLNs), where nodes have limited memory, processing capability, and power. However, stringent Quality of Service (QoS) is mandatory which is challenging to provide as the sensors are interconnected using lossy links. A routing protocol is needed as these devices can be scattered in an unplanned manner. Considering unanticipated characteristics of LLNs, Internet Engineering Task Force (IETF) developed, and standardized the Routing Protocol for LLNs (RPL). RPL is an IPv6 network and builds a tree-like topology which is based on few network metric optimization process using different Objective Functions (OF) to fulfill desired routing process. In this paper, we proposed a routing and a transmission power control algorithm to design a reliable energy efficient and low-cost RPL based system for IoT applications.
Stream control Transmission Protocol (SCTP) is a new reliable transport layer protocol. This paper, analyzes the performance of the SCTP for IPTV applications using the SCTP distinctive features such as Partial-Reliab...
详细信息
ISBN:
(纸本)9788955191318
Stream control Transmission Protocol (SCTP) is a new reliable transport layer protocol. This paper, analyzes the performance of the SCTP for IPTV applications using the SCTP distinctive features such as Partial-Reliable SCTP (PR-SCTP) and multi-streaming. From the experimental results, it is shown that the PR-SCTP provides better goodput than TCP and better quality of services than UDP for real-time IPTV applications. From the viewpoint of the multi-streaming feature, it is shown that the SCTP overcomes the well-known Head-of-Line (HoL) blocking problems when multiple streams are transported over the SCTP. In addition, the multi-streaming SCTP gives faster channel switching time, compared to the TCP.
To generate the reference waveforms of the switch-linear hybrid flexible waveform power amplifier, an arbitrary waveform generator is implemented in this paper. With the advantages of the DDFS, such as fast setting ti...
详细信息
A diesel-generator can be applied to electric vehicle as an auxiliary power unit (APU). As for its generator, an excitation control method without the brushless exciter parameters is presented. Its first order lag mod...
详细信息
Based on a nonlinear model of induction motor containing both electrical and mechanical dynamics, an combined field orientation and adaptive backstepping approach is proposed in this paper for the control of induction...
详细信息
Based on a nonlinear model of induction motor containing both electrical and mechanical dynamics, an combined field orientation and adaptive backstepping approach is proposed in this paper for the control of induction motors. Rotor angular speed and rotor flux amplitude tracking objectives are formulated so that the speed regulation is achieved with the consideration of improving power efficiency. Parameter uncertainties of the rotor resistance and load torque disturbance are compensated using adaptive control techniques. Simulation results are provided to demonstrate the effectiveness of the proposed approach.
Protection of ICS process control data, networks, applications, and host operating systems, particularly in multi-vendor environments, is a critical, on-going requirement for the oil and gas sector. A loss of control ...
详细信息
ISBN:
(纸本)9781467327091;9781467327084
Protection of ICS process control data, networks, applications, and host operating systems, particularly in multi-vendor environments, is a critical, on-going requirement for the oil and gas sector. A loss of control over a critical control process potentially could result in loss of life, personnel injury, environmental impact, facility damage, production loss, and economic cost. System maintenance and protection increasingly centers on patching vulnerable automation software and operating systems, many of which have reached end-of-life, are unsupported by the vendor, or lack economic basis for replacement. A new alternative to the classic patching approach to maintaining system security, application whitelisting (AWL) technology, was evaluated against a set of established criteria that support continuity of operations in critical system environments by providing strong cybersecurity. This report presents findings of the LOGIIC program regarding application whitelisting, key attributes to its use in an ICS environment, and general conclusions about its implementation.
The requirement that aircraft receives remote control instruction to change its mission is becoming more and more eagerly. In order to responding the control instruction rapidly, signal processor on data link terminal...
详细信息
In view of the current situation that the muzzle tightening device can only tighten the muzzle of a single projectile, a flexible muzzle tightening device is developed, which is suitable for pressing various small-cal...
详细信息
暂无评论