This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of ...
详细信息
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of information of software requirements specification (SRS) for software quality assessment (by ISO 25010:2011). The first time proposed method of generating and filling the template of ontology for the quality of the concrete software leaves in the relevant ontology only measures, which are available in the SRS for the concrete software. It provides forming the ontology for the quality of the concrete software. The first time developed method of forming the logical conclusion about the sufficiency of the SRS information for software quality assessment provides the conclusion about the sufficiency or insufficiency of the SRS information for software quality assessment by ISO 25010:2011. If the SRS information is insufficient, this method: provides the conclusion for which characteristics and sub-characteristics the information is insufficient; creates the sorted list of missing measures as the recommended priority of their addition in the SRS; evaluates the veracity of software quality assessment based on the available in the SRS measures.
This paper deals with the Sudden Infant Death Syndrome (SIDS) problem. The main objective is to limit it by controlling the main reasons that may lead to it. Sudden infant death syndrome is the death without specific ...
详细信息
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on the collected data about the cyberattacks. It makes it possible to give an answer about the cyberattacks' existence in the computer networks and its hosts. Developed attack detection approach consists of training and detection stages. The mechanism of attack detection system is based on the cyberattacks' features gathering from network or hosts, extracting the subset of acquired set and generation the attacks' detection rules. Genetic algorithms are used for the minimization of the feature set, which allows effective using of the system resources for attacks detection. In order to detect the attacks, the proposed technique involves the rule generation. The attacks' features are described by the set of sub-rules. It is suggested to use the feature with the smallest domain for generating the minimal set for rules. It is possible to select the optimal feature after all selected features which were discovered while applying the genetic algorithm. The sub-rule set is used with the aim to reduce false positive rate.
The rapid development of digitalization and the creation of electronic resources, in areas such as e-commerce, government portals and others leads to the actualization of data protection issues. The protection of elec...
详细信息
Verification of Linux kernel modules and especially device drivers is a critically important task. However, due to the special nature of the kernel operation, it is very challenging to perform runtime analysis of part...
详细信息
Verification of Linux kernel modules and especially device drivers is a critically important task. However, due to the special nature of the kernel operation, it is very challenging to perform runtime analysis of particular kernel modules of interest without adverse influence on the rest of the kernel. Methods and tools for addressing this challenge are the main subject of this paper. The basic method for low-influence runtime analysis of interacting software modules is call interception. Shadow state techniques represent another method. In this paper, we discuss these methods including three different approaches to implement call interception. Conclusions are made about the most suitable ways for runtime analysis of kernel modules. Finally, we present KEDR framework, an extensible runtime analysis system for Linux kernel modules, which deploys these approaches to perform different types of analysis. The system can be used by the developers of kernel modules and, in particular, may be useful for building automated driver verification systems.
Increasing requirements to the content and form of higher education in conditions of digital economy set new tasks for professors: formation of applied competences, the involvement of students in project activities, p...
详细信息
ISBN:
(纸本)9781538667583
Increasing requirements to the content and form of higher education in conditions of digital economy set new tasks for professors: formation of applied competences, the involvement of students in project activities, provision of students' online support, their individual and project work. The growing load on university professors complicates satisfaction of these requirements. The development of the lecturers' network interaction makes it possible to redistribute the load for disciplines methodological provision. The article reveals possibilities of lecturers' network interaction by using innovative teaching methods including gaming forms and online courses. The research scientific novelty is to implement the lecturers' network interaction and experimental application of innovative teaching methods. Network interaction was carried out through the educational process of students' preparation in following areas: information security, applied information technology, business information technology.
This paper presents the process of data anonymisation and de-identification, the use of de-identification techniques as a means of data protection, and analyses de-identification and their relevance to the tasks they ...
详细信息
We offer a standpoint that emotions are a necessary mechanism for autonomous control systems. By an autonomous controlled object we understand an object, that is controlled by a control system which is its on-board su...
详细信息
We offer a standpoint that emotions are a necessary mechanism for autonomous control systems. By an autonomous controlled object we understand an object, that is controlled by a control system which is its on-board subsystem. The control system performs learning and control in one process. We develop a methodology of autonomous adaptive control (AAC), that allows us to construct a control system for a given controlled object. As the control goals we take the controlled object survival and the knowledge accumulation. As a whole these goals bring maximization of the controlled object lifetime. We suggest an emotions modeling mechanism (EM). We give the description of its functions and their implementation in AAC methodology. These functions are: (1) a compulsion of the control system for activity; (2) an appreciation of the CO current state at its quality; (3) an appreciation of the formed patterns and their usefulness for control goals; (4) an influence on tempo and depth of reasoning of decision making in current state; (5) providing the decision making subsystem with emotional appraisals of the recognized patterns; (6) providing transfer of information on patterns of emotional appraisals simultaneously with information on the patterns while the organism interacts with another organism.
暂无评论