Electric Vehicles (EVs) become very important issue and gained attention due to many reasons like its economic price, saving environment and more reliable. In this study, controlling speed for EV is utilized by tracki...
详细信息
In the current industrial environment, which is shifting towards an event-based control prone paradigm, sampling strategies in use must be revisited. Both temporal and magnitude dependent sampling strategies have been...
详细信息
Fault diagnosis of rotating machinery driven by induction motors has received increasing attention. Current diagnostic methods, which can be performed on existing inverters or current transformers of three-phase induc...
详细信息
One of the objectives of event-based control is the reduction of generated events to perform an appropriate process control. Among the event generation techniques used to this end, those quantifying the error signal c...
详细信息
It is well known that nowadays children tend to spend lot of time playing games on mobile devices at the expense of reading books. The current research aims to explore ways to design and develop a mobile application, ...
详细信息
The article is devoted to the analysis of the possibilities of improving the methodology for selecting the operation parameters of the longitudinal differential protection of a power transformer when using new types o...
详细信息
Signal propagation is a prevalent research topic for an abound-ing number of complex network applications. The nonlinear characteristics of complex networks determined by complex interactions and topology re-quire sui...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
The exponential growth of academic publications has made scholarly research recommender systems indispensable tools for researchers. These systems rely on diverse evaluation metrics to assess their effectiveness and r...
详细信息
This article presents a project of a small-sized remotely operated underwater vehicle (ROV) being designed and developed at SMTU. Paper describes a functional scheme of the underwater vehicle, motion control units wit...
详细信息
暂无评论