When energy storage is limited, energy efficiency is crucial for hybrid and electric vehicles (EVs). The induction motor's high stability, low cost, and little loss structure boost its efficiency. Furthermore, eve...
详细信息
The cost of power converters plays a crucial role in designing high-voltage off-board electric vehicle (EV) chargers. A multilevel topology, especially, dual active bridge (DAB) converter is utilized in a fast EV char...
详细信息
As modern VLSI circuits encounter growing challenges in power consumption and interconnect complexity, ternary logic emerges as a promising alternative to traditional binary logic by introducing a third logic state. T...
详细信息
This study investigates the deployment of a phase frequency detector by utilizing 45 nm CMOS technology. The work involves designing and analyzing the proposed detector to evaluate its performance and capabilities wit...
详细信息
The field-weakening control method with voltage angle regulator (VAR) has the advantages of better efficiency and power capacity by improving the voltage modulation index (MI). However, the control error of MI, which ...
详细信息
In order to improve the level of medical service, a medical questions answering system based on knowledge graph is designed. Firstly,crawler technology is used to capture medical website data,and medical knowledge gra...
详细信息
Many organizations have published yearly reports on cloud security threat intelligence. These reports have shown a drastic increase in security attacks on cloud computing services. Such reports end up gathering dust w...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981;9798350373974
Many organizations have published yearly reports on cloud security threat intelligence. These reports have shown a drastic increase in security attacks on cloud computing services. Such reports end up gathering dust without exploiting the reports' usefulness due to their sheer size. The threats have to be analysed timeously to provide and anticipate solutions before further security attacks occur. With the increase in cloud computing usage, there has been an increase in security breaches. The cloud also adds to an aspect of volatility in provisioning of services and at the edge components availability. Incidents which have already been captured in incidents reports can be used to conduct digital forensic investigations (DFIs). For DFI process to be conducted, there is need for the environment to be prepared beforehand, thus, to say, the environment such as the cloud, should be digital forensics ready (DFRy). Digital forensics readiness (DFR) assists by providing a proactive way for DFI process to be conducted. Artificial intelligence (AI) applications assist in the processing of security incidence reports. This paper proposed the use of un-supervised learning techniques in the field of AI by exploring security threat intelligence reports. AI algorithms are used in the automated analysis of large and complex datasets in intelligence reports thus greatly accelerating the prediction of security incidents in order to provide DFR to the computing environment and anticipated responses for the reduction of security incidents.
This paper focuses on developing a path planning algorithm for a wheeled mobile robot with actuator constraints. The proposed motion planning approach is divided into two stages: path planning, followed by path follow...
详细信息
The concept of the Internet of Things (loT) has become a fundamental component of the new technologies industry. Artificial intelligence (AI) is integrated into loT systems as an optimal method for handling large volu...
详细信息
This work proposes an open-loop methodology to solve chance constrained stochastic optimal control problems for linear systems with a stochastic control matrix. We consider a joint chance constraint for polytopic time...
详细信息
暂无评论