Purpose - The main aim of this study was a preparation development of dopant solution (DS) which can be deposited by a spray-on method and subsequently allows obtaining the no emitter layer with surface resistance in ...
详细信息
In this paper, we consider the robustness of a basic model of a dynamical distribution network. In the first problem, i.e., optimal weight allocation, we minimize the H∞- norm of the dynamical distribution network su...
详细信息
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Theref...
详细信息
ISBN:
(纸本)9781509054442
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Therefore, Linux's kernel security has a lot of impact on IT&C industry. This paper presents an audit solution over the Linux kernel in order to discover security vulnerabilities. Therefore, fuzzing campaigns are performed through system calls. This choice was made due to the fact that system calls are the natural way user space communicates with the kernel space and a real life scenario can be reproduced.
In unmanned aerial vehicle (UAV) networks, directional modulation (DM) is adopted to improve the secrecy rate (SR) performance. Alice, a ground base station, behaves as a control center, and Bob is a UAV of flying alo...
详细信息
Systems are often controlled using feedback loops. Fault diagnosis schemes are usually designed assuming that there is no feedback loop. Therefore fault diagnosis methods need to accommodate for the feedback loop. One...
详细信息
Systems are often controlled using feedback loops. Fault diagnosis schemes are usually designed assuming that there is no feedback loop. Therefore fault diagnosis methods need to accommodate for the feedback loop. One such method is active fault diagnosis based on a fault signature system. This method is derived using the YJBK parametrisation, named after Youla, Jabr, Bongiorno and Kucera. It uses the derived fault signature system to determine the detectability of possible faults in the system. Deriving the fault signature system requires knowledge about the controller. This paper demonstrates the possibility of estimating the detectability of faults in the fault signature system using a gap-metric. The gap-metric has the advantage of only requiring knowledge about the plant. By using the gap-metric it is possible to estimate the detectability of faults without using information about the controller.
We propose a new ensemble forecasting method, Bayesian enhanced ensemble approach (BEEA), to model neural networks for time series forecasting. Motivated by looking to get better prediction algorithms, our proposed al...
详细信息
The problem of control object with the use of feedback loop is extremely relevant, because only this method provides for the accurate control. It happened that the theory of automaticcontrol paid much attention to th...
详细信息
ISBN:
(纸本)9781538649398
The problem of control object with the use of feedback loop is extremely relevant, because only this method provides for the accurate control. It happened that the theory of automaticcontrol paid much attention to the methods of regulators design based on mathematical transformations, using a mathematical model of the object. It describes the transformation of an input signal into an output signal inside the object. The methods were imperfect, so one of the following simplification methods was the most frequently used: the mathematical model of the object was simplified, or the calculations were carried out with approximation, for example, the oscillations in the system were studied by the amplitude and phase of the first harmonic only. Therefore, the result of using such regulators in practice did not exactly correspond to the theory provisions. To get mathematical and experimental basis of system developer tool, a solution of the elementary sub-problems was required. Among them there are tasks of the control of an object of the first and second order. Today the situation has changed. There is a means of sufficiently accurate mathematical modeling of the behavior of the system consisting of the loop with an object and a regulator. There are software and mathematical means for regulator calculating by the method of numerical optimization. Now there is sufficient software for calculating the regulators of the object, having a rather complex mathematical model. However, this did not change the situation. A lot of articles are still published, in which it is suggested performing additional fine tuning to achieve the required parameters after calculating the regulator and its technical implementation. Quite a big number of articles is still being published; they consider the methods of the empirical tuning of regulators based on the parameters of the transient process with a given fixed gain coefficient. This situation demonstrates insufficient using of the important t
This paper concerns solvers for time fractional differential equations in Matlab and Octave. The main analysis revolves around a time step size adaptive solver basing on the numerical method called SubIval. The basis ...
详细信息
This paper concerns solvers for time fractional differential equations in Matlab and Octave. The main analysis revolves around a time step size adaptive solver basing on the numerical method called SubIval. The basis of SubIval is explained and formulae for the step size adaptivity are given. The solver is compared with others basing on: fractional linear multistep methods, product integration rules and the Grunwald-Letnikov approximation.
It is well known that the complex system operation requires the use of new scientific tools and computer simulation. This paper presents a modular approach for modeling and analysis of the complex systems (in communic...
详细信息
Source Routing allows a node in the path of a packet to specify partially or completely the route taken by that packet. The route is appended to packet header as a list of nodes to traverse, therefore making simple, s...
详细信息
Source Routing allows a node in the path of a packet to specify partially or completely the route taken by that packet. The route is appended to packet header as a list of nodes to traverse, therefore making simple, stateless forwarding decisions. In this paper, we present a novel approach of Source Routing in SDN that uses stacked VLAN tags. Our solution was validated in Mininet using the Ryu controller and proven to have multiple advantages over other forwarding methods.
暂无评论