This paper addresses the challenge of commonmode voltage (CMV) generation in three-phase two-level back-to-back converters, which are a significant source of electromagnetic interference (EMI) in variable-speed drive ...
详细信息
This paper presents a adaptable multilevel inverter design utilizing the Packed E-Cell (PEC) configuration. This topology is well-suited for converting energy generated by photovoltaic systems to power AC loads and fo...
详细信息
The examination of the increasing noise in the distribution transformer station next to the offices is the focus of this paper. Office workers' mental health has been found to be disturbed by some features of tran...
详细信息
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,...
详细信息
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,the efficacy and robustness of the HRI control algorithm in the presence of unknown external disturbances deserve to be *** deal with these urgent issues,in this study,artificial systems,computational experiments and a parallel execution intelligent control framework are constructed for the HRI *** upper limb-robotic exoskeleton system is re-modelled as an artificial *** on surface electromyogram-based subject's active motion intention in the practical system,a non-convex function activated anti-disturbance zeroing neurodynamic(NC-ADZND)controller is devised in the artificial system for parallel interaction and HRI control with the practical ***,the linear activation function-based zeroing neurodynamic(LAF-ZND)controller and proportionalderivative(posterior deltoid(PD))controller are presented and *** results substantiate the global convergence and robustness of the proposed controller in the presence of different external *** addition,the simulation results verify that the NC-ADZND controller is better than the LAF-ZND and the PD controllers in respect of convergence order and anti-disturbance characteristics.
The scalability of today's networking infrastructures, such as Kubernetes, has increased the demand for everything-as-a-service concepts, including encryption services. This paper details deploying an Encryption a...
详细信息
Deep learning (DL) has transformed the field of medical image processing, enabling unprecedented accuracy and efficiency in various applications. It has been widely utilized for medical image analysis of different ana...
详细信息
Conventional power grids consist predominantly of traditional power generation assets and sources such as oil, coal, and gas power plants. Nowadays power grids are rapidly developing towards an increasing share of pow...
详细信息
In this paper is presented implementation of a lightweight supervisory control and data acquisition system for remote test stations as a part of a larger test house in the automotive industry. It is necessary to allow...
详细信息
ISBN:
(纸本)9798350347722
In this paper is presented implementation of a lightweight supervisory control and data acquisition system for remote test stations as a part of a larger test house in the automotive industry. It is necessary to allow remote set up and monitoring of the test stations, which means defining the structure of a system with numerous test stations as endpoints. The test stations are meant to be virtual machines but can be both virtual and physical machines. A communication protocol must be used that enables this within the organization's network, regardless of actual distance and location. The parameters of the test stations to be monitored can be defined according to the needs and purpose. Even when creating your own tool, this function is not unique, i.e. on one test station parameters of operating system resources such as memory usage can be monitored, while on another test station logged-in users or running programs, reported system errors and others must be monitored. Data storage is one of the mandatory functions of this system. This process allows viewing data throughout history and more detailed analysis of events. There are numerous benefits that can be drawn and used from the data stored in the database. It is necessary to pay attention to the data stored as well as the scope and retention throughout history. The correct and secure setup of a database is one of the prerequisites for any serious system that processes data. Appropriate views should be created for users involved in the data monitoring process using all the elements mentioned so far. Creating a visually acceptable and easy-To-use interface that serves the main purpose is the final presentation of the entire system to users. A complete system leads to higher productivity, profitability and better organization of the company. It also allows project managers to better plan the use and occupancy of test stations. At any time, they have insight into the status of individual test stations, their activitie
暂无评论