The paper presents the results obtained by the authors during the research done on the efficient usage of photovoltaic panels and proposes performant numerical methods for the estimation of the maximum power point (MP...
详细信息
The paper presents the results obtained by the authors during the research done on the efficient usage of photovoltaic panels and proposes performant numerical methods for the estimation of the maximum power point (MPP). The P(U) and P(I,U) models are computed for the BGSP - P225 solar panel model. For the first model, P(U), the paper proposes a polynomial interpolation search algorithm and for the P(I,U) model an optimal gradient algorithm, respectively. The performances obtained with these methods are evaluated and the main results are commented. The implementation of the search algorithms for the maximum power point is important for the computation of the set point given to the control systems, which control the photovoltaic panel, in order to obtain optimal photovoltaic generated power.
In light of the rapid development of network technology, the general concept of software requires redefinition. New opportunities provided by broadband networking, distributed processing, and available network resourc...
详细信息
The service-oriented environment offers the opportunity to create new applications, by combining existing applications offered as services, in order to react to the business' increasing pressure of quickly deliver...
详细信息
The service-oriented environment offers the opportunity to create new applications, by combining existing applications offered as services, in order to react to the business' increasing pressure of quickly delivering new applications. With a large number of web services offering the same functionality, choosing the web services that meet best the client's quality of service (QoS) requirements is a very important task. We introduce a QoS-aware end to end web service composition approach that handles all the stages from the web service discovery step, to the actual binding of the services. This approach uses our method of expressing nonfunctional preferences, which requires minimal effort on the part of the clients, but offers great flexibility in managing trade-offs. We define a QoS preferences ontology and use it in our semantic web service selection to choose an initial candidate list of services for every task in the orchestration model. Then, one concrete service is chosen from each candidate list and is boand to the corresponding task. This step involves computing and comparing the aggregated QoS of the resulting composite services. The selection is performed using a genetic algorithm.
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and ...
详细信息
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and variety of new hardware or software, overwhelms monitoring controls. Furthermore, the multi-facets of cyber threats today makes it difficult even for security experts to handle and keep up-to-date. Hence, automatic "intelligent" tools are needed to address these issues. In this paper, we describe a `work in progress' contribution on intelligent based approach to mitigating security threats. The main contribution of this work is an anomaly based IDS model with active response that combines artificial immune systems and swarm intelligence with the SVM classifier. Test results for the NSL-KDD dataset prove the proposed approach can outperform the standard classifier in terms of attack detection rate and false alarm rate, while reducing the number of features in the dataset.
The paper discusses the design process of a programmable logic controller implemented by means of FPGA device. Designed PLC is to be compliant with EN 61131-3 standard. Diiferent aspects of instruction list and hardwa...
详细信息
The paper discusses the design process of a programmable logic controller implemented by means of FPGA device. Designed PLC is to be compliant with EN 61131-3 standard. Diiferent aspects of instruction list and hardware architecture designing are presented, e.g. PLC structure with particular emphasis on central processing unit or memory map. Conclusions on an EN 61131-3 Standard are also shown. The developed PLC is implemented using FPGA device. This gives opportunity to develop interesting solutions. For example, using dual port RAM gives us opportunity to develop bit/word access without necessity of masking bits. Up to date FPGA devices have also disadvantage - there are no tri-state buffers inside. This is the reason for using multiplexers that control traffic on busses.
Large scale, cyber-infrastructure systems include a large base of heterogeneous data sources, geographically distributed. Cloud storage services can be an ideal candidate for storing all these data. However, it is dif...
详细信息
Large scale, cyber-infrastructure systems include a large base of heterogeneous data sources, geographically distributed. Cloud storage services can be an ideal candidate for storing all these data. However, it is difficult to find the optimal solution in order to select a set of storage providers, with respect to different multiple objectives of this type of systems, such as cost optimization, budget constraints, Quality of Service (QoS), load balancing etc. In this paper, we study the multi-objective optimization problem for storage service selection with budget constraints. We start from a real world case scenario and build our mathematical model for the optimization problem. Then we propose a linear programming technique to find a near optimal solution for the service selection problem.
Current concerns about data privacy have lead to increased focus on data anonymization methods. Differential privacy is a new mechanism that offers formal guarantees about anonymization strength. The main challenge wh...
详细信息
Current concerns about data privacy have lead to increased focus on data anonymization methods. Differential privacy is a new mechanism that offers formal guarantees about anonymization strength. The main challenge when using differential privacy consists in the difficulty in designing correct algorithms when operating on complex data types. One such data type is sequential data, which is used to model many actions like location or browsing history. We propose a new differential privacy algorithm for short sequence counting called Recursive Budget Allocation (RBA). We show that RBA leads to lower relative errors than current state of the art techniques. In addition, it can also be used to improve relative errors for generic differential privacy algorithms which operate on data trees.
Nowadays, novel construction materials, more efficient power supplies and advanced artificial intelligence algorithms allow one to use unmanned aerial vehicles (UAV) in various fields of life. One of the biggest event...
详细信息
ISBN:
(纸本)9781479987023
Nowadays, novel construction materials, more efficient power supplies and advanced artificial intelligence algorithms allow one to use unmanned aerial vehicles (UAV) in various fields of life. One of the biggest events promoting this idea is the Air Cargo Challenge (ACC) competition. In this paper the motivation for ACC participation and the overall procedure of CAD aided UAV design are presented. The nonlinear aircraft model as well as Computational Fluid Dynamic simulations are discussed. Finally, some details concerning designed UAV prototype are revealed.
This paper presents a thorough analysis of the behavior of a bio-inspired model to care for casualties in a disaster. The model was proposed by the authors in a previous paper and a simulation based on it was performe...
详细信息
This paper presents a thorough analysis of the behavior of a bio-inspired model to care for casualties in a disaster. The model was proposed by the authors in a previous paper and a simulation based on it was performed and evaluated. Here, we analyze the evolution of the system and the impact that various model parameters can have over it. Once the behavior is well understood, we can then focus our research on certain groups of parameter adjustments so that with a minimum implementation cost to achieve a maximum benefit in terms of saved lives.
Infrared modulated signals are widely used in remote controls of common household appliances, as well as in business and public places. However, the transmission is not encrypted in any form, and can easily be interce...
详细信息
Infrared modulated signals are widely used in remote controls of common household appliances, as well as in business and public places. However, the transmission is not encrypted in any form, and can easily be intercepted and stored for future control of the appliance. This paper explains the functioning of a portable device which can intercept infrared (IR) signals and retransmit them when needed. The device was designed to include multiple functions, have a small number of buttons, and also to be portable, making it a functional keyring. As an added feature, the device can emit an infrared jamming signal, disabling any other user's commands. Finally, we created a small, low power, reliable device that can easily duplicate infrared codes. This makes the device a portable IR security penetration tool that can take over an appliance or disable its remote control.
暂无评论