This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host,...
详细信息
ISBN:
(纸本)9781538606384
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host, which could be accessed from other networks, is conducted. Proposed metric considers a possibility of attack propagation within the network.
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads...
详细信息
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads. A DC-to-DC converter is connected to the output terminals of the studied SOFC for stabilizing output voltage and current fluctuations under different loading conditions. The PWM inverter connected to the output terminals of the DC-to-DC converter is operated under voltage-controlled mode to regulate the voltage profile across the connected loads. It can be concluded from the simulation results that the proposed voltage and frequency droop controllers of the PWM inverter may operate satisfactory under stand-alone mode.
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: t...
详细信息
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: the parallel recursion, inter-recursion, and the recursion of high level. The paper has exposed each form on the LISP language, being the classic functional language as well as the ground for the development of all other languages. The verification for the forms of the recursive functions was adopted with structural and transfinite induction methods. The analysis describe combined induction technique and its algorithm is discussed which is used for verification for such complex functions, arguments of which are again the recursive functions. The discussed verification method of the programs those being offered for the functional languages was applied for the imperative paradigm languages, in particular for Language C and more precisely for C subset (consider that the C program consists of the assigning, optional and cycle operators only).
The problem of forecasting long sequences is important in many different domains. Proper selection of the hyperparameters when a machine learning approach is applied could make the difference between adequate and inad...
详细信息
ISBN:
(数字)9781665497770
ISBN:
(纸本)9781665497787
The problem of forecasting long sequences is important in many different domains. Proper selection of the hyperparameters when a machine learning approach is applied could make the difference between adequate and inadequate model. Several algorithms for automatic hyperparameters tuning were evaluated and compared with baseline selection. As a result, recommendations have been made. Some of the intuitive assumptions for the baseline model proved to be wrong.
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err...
详细信息
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.
This paper explains in detail several methods for utilization of class based n-gram language models for automatic speech recognition, within the Kaldi speech recognition framework. It reexamines an existing implementa...
详细信息
In the present market scenario, it is seen that commodity is attracted by the stock of the items. Considering this fact in this present work, the demand for the item is considered as stock dependent in an inventory co...
详细信息
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more...
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more and more critical, and if not treated smartly this issue will negatively affect drivers by wasting time and fuel gas while waiting for hours in lanes. This paper presents a new and smart way to mitigate this issue in an affordable cost, minimum processing power, and low power consumption. This concept takes into consideration the majority of the cases that may cause congestion and presents a smart and accurate outputs to ease traffic flow leading to the prediction of the peak hours of traffic congestion for smarter control. A model is designed to study the case of a four lanes crossroad with two traffic lights and two LCD monitors. The strategy in reading data is divided into two parts: real data from sensors and pre collected data from google maps to create a kind of a predicted pattern over a certain time interval. The responsiveness of the system is analyzed thoroughly, and the accuracy of all possible cases is carefully considered and evaluated. Each part of the system was tested alone, and the overall system is still in an ongoing testing phase. The results have shown minimum faulty errors and accepted outputs that can lead to safe traffic control decisions. Finally, integrating more IoT devices and sensors between V2V, V2P, V2I with the help of artificial intelligence will definitely optimize this system with higher accuracy.
暂无评论