This research aims to develop a framework for writing a business plan that support innovation for undergraduate students. The scope of this research is circumscribed to undergraduate students in Thailand. In respect o...
详细信息
Nowadays, designing and developing wearable devices that could detect many types of diseases has become inevitable for E-health field. The decision-making of those wearable devices is done by various levels of analysi...
详细信息
This paper presents a low complexity maximum likelihood detection (MLD) algorithm called one-bit-sphere- decoding for an uplink massive multiple-input multiple- output (MIMO) system with one-bit analog-to-digital conv...
详细信息
A different channel spacing characteristics was analysed using wavelength-division Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM). In a system has 32 channels using only Single Mode Fiber (SMF) (...
A different channel spacing characteristics was analysed using wavelength-division Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM). In a system has 32 channels using only Single Mode Fiber (SMF) (without any amplifier or DCP) over a frequency range (100 – 400) GHz. Then compare their effectiveness, according to the distance to cover, Q factor, bit error rate (BER) and power needed, by means of advanced modulation schemes return-to-zero (RZ) in order to determine the best frequency channel. It is observed that the 100 GHz channel spacing has the maximum transmission coverage up to 90 km with acceptable power, BER and Q-factor which it is equal to 10 dB, 2.08 × e−29 and 11.19 respectively.
Cyber-attacks have grown in importance to become a matter of national security. A growing number of states and organisations around the world have been developing defensive and offensive capabilities for cyber warfare...
详细信息
ISBN:
(纸本)9781911218852
Cyber-attacks have grown in importance to become a matter of national security. A growing number of states and organisations around the world have been developing defensive and offensive capabilities for cyber warfare. Security criteria are important tools for defensive capabilities of critical communications and information systems (CIS). Various criteria have been developed for designing, implementing and auditing CIS. However, the development of criteria is inadequately supported by currently available guidance. The relevant guidance is mostly related to criteria selection. The abstraction level of the guidance is high. This may lead to inefficient criteria development work. In addition, the resulting criteria may not fully meet their goals. To ensure efficient criteria development, the guidance should be supported with concrete level implementation guidelines. This paper proposes a model for efficient development of security audit criteria. The model consists of criteria design goals and concrete implementation guidelines to achieve these goals. The model is based on the guidance given by ISACA and on the criteria development work by FICORA, the Finnish communications Regulatory Authority. During the years 2008-2017, FICORA has actively participated in development and usage of three versions of Katakri, the Finnish national security audit criteria. The paper includes a case study that applies the model to existing security criteria. The case study covers a review of the criteria composed of the Finnish VAHTI-instructions. During the review, all supported design goals and implementation guidelines of the model were scrutinised. The results of the case study indicate that the model is useful for reviewing existing criteria. The rationale is twofold. First, several remarkable shortcomings were identified. Second, the identification process was time-efficient. The results also suggest that the model would be useful for criteria under development. Addressing the iden
The impact of imperfect channel state (CSI) information in an energy harvesting (EH) cooperative non-orthogonal multiple access (NOMA) network, consisting of a source, two users, and an EH relay is investigated in thi...
详细信息
In this paper, an effective finite-control-set model predictive controller (FCS-MPC) is proposed for an active dual output rectifier. The topology under study is a 5-level packed U cells (PUC5) rectifier. The optimize...
详细信息
In this paper, an effective finite-control-set model predictive controller (FCS-MPC) is proposed for an active dual output rectifier. The topology under study is a 5-level packed U cells (PUC5) rectifier. The optimized cost function is designed based on the capacitors' voltages and current errors. The Capacitors' reference voltages and the peak value of the reference grid current are used to normalize the errors within the cost function. The peak value of the current reference is generated by a PI controller using the capacitors' voltage errors. The presented results show a proper tracking of the rectifier's dual output voltages while ensuring a unity power factor.
Electrical impedance tomography (EIT) is developed to investigate the internal conductivity changes of an object through a series of boundary electrodes, and has become increasingly attractive in a broad spectrum of a...
详细信息
Millimeter wave (mmWave) systems can enable high data rates if the link between the transmitting and receiving radios is configured properly. Fast configuration of mmWave links, however, is challenging due to the use ...
详细信息
暂无评论