Polymorphic viruses pose a significant challenge to traditional malware detection methods due to their ability to modify their code structure with each infection, effectively evading signature-based detection. This pa...
详细信息
This work considers the problem of intercepting rogue drones targeting sensitive critical infrastructure facilities. While current interception technologies focus mainly on the jamming/spoofing tasks, the challenges o...
详细信息
The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean *** the past,generation systems depended on non-renewable sources such as oil,coal,and ***,this pap...
详细信息
The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean *** the past,generation systems depended on non-renewable sources such as oil,coal,and ***,this paper assesses the performance of a 51 kW PV solar power plant connected to a low-voltage grid to feed an administrative building in the 6th of October City,*** performance analysis of the considered grid-connected PV system is carried out using power system simulator for engineering(PSS/E)*** the PSS/E program,monitors and uses the power analyzer that displays the parameters and measures some parameters such as current,voltage,total power,power factor,frequency,and current and voltage harmonics,the used inverter from the type of grid inverter for the considered *** results conclude that when the maximum solar radiation is reached,the maximum current can be obtained from the solar panels,thus obtaining the maximum power and power *** total voltage harmonic distortion,a current harmonic distortion within permissible limits using active harmonic distortion because this type is fast in processing up to 300 *** connection between solar stations and the national grid makes the system more efficient.
A novel approach defined by the artificial neural network (ANN) model trained by the improved Gauss-Newton in conjunction with a simulated annealing technique is used to control a step-up converter. To elucidate the s...
详细信息
In the present study we present a numerical modeling of a laminate magnetic material using an homogenization technique which exploit an inverse problem resolution. The laminate magnetic material is consisting of an al...
详细信息
A new single-stage high-gain interleaved boost modular CL resonant converter is proposed in this paper for photovoltaic-powered magnetron application. The proposed converter is able to provide high voltage gain for th...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console *** the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also *** leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious ***,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is *** data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT ***,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT *** is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient ***,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion *** performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed *** experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed *** addition,the proposed work accomplishes high performance compared to other recent rela
This paper brings the concept of 'optimism' to the new and promising framework of online Non-stochastic Control (NSC). Namely, we study how NSC can benefit from a prediction oracle of unknown quality responsib...
详细信息
Social networks, that have grown so prevalent nowadays, enable users to exchange information and save a significant amount of personal data about them. Although the information that is stored can be useful for enhanci...
详细信息
The ever-increasing dependence on electrical power has posed more challenges to power system engineers to deliver secure, stable, and sustained energy to electricity consumers. Due to the increasing occurrence of shor...
详细信息
The ever-increasing dependence on electrical power has posed more challenges to power system engineers to deliver secure, stable, and sustained energy to electricity consumers. Due to the increasing occurrence of short-and long-term power interruptions in the power system, the need for a systematic approach to mitigate the negative impacts of such events is further manifested. Self-healing and its control strategies are generally accepted as a solution for this concern. Due to the importance of self-healing subject in power distribution systems, this paper conducts a comprehensive literature review on self-healing from existing published papers. The concept of self-healing is briefly described, and the published papers in this area are categorized based on key factors such as self-healing optimization goals, available control actions, and solution methods. Some proficient techniques adopted for self-healing improvements are also classified to have a better comparison and selection of methods for new investigators. Moreover, future research directions that need to be explored to improve self-healing operations in modern power distribution systems are investigated and described at the end of this paper.
暂无评论