In a basketball game, players must act appropriately according to the position and movement of the player. This needs to be learned through team practice. Therefore, if we can build an environment that allows even one...
详细信息
Objective: Magnetic fields switching at kilohertz frequencies induce electric fields in the body, which can cause peripheral nerve stimulation (PNS). Although magnetostimulation has been extensively studied below 10 k...
详细信息
IT/OT convergence in the form of a Cyber-Physical System (CPS) presents an opportunity to apply recent Information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber se...
详细信息
ISBN:
(数字)9798350395419
ISBN:
(纸本)9798350395426
IT/OT convergence in the form of a Cyber-Physical System (CPS) presents an opportunity to apply recent Information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber security threats for OT. The OT communication protocols, for example, have limited or no security capabilities for securing data exchange beyond basic authentication. The RNG (Random Number Generator) function is crucial in PLC for producing the encryption keys or the initial seed for security algorithms. The software-based PRNG (Pseudo RNG) is the most common approach for RNG in OT, instead of hardware-based RNG. This study provides a systematic literature review of the most recent evidence in digital transformation to secure data exchange in smart factories, within OT, or across OT and IT settings. It does this by looking at the PRNG on PLC and identifying the most recent trends and best practices. The findings include up-to-date data on author countries' distribution, published journals, research trends, industries, and industry types. The findings also address whether data flow is encrypted or shared in plaintext to ensure secure data transfer between IT and legacy OT environments. This paper concludes that while there is known RNG implementation in the actual embedded system in ICS, there is no evidence in the literature for using RNG in ICS networks for PLC implementation to secure data transfer with encryption.
The virtual synchronous machine (VSM) has been a potential solution to control the grid-forming converters to integrate renewable energies (RES) into the grid. It is responsible for emulating the kinetic energy and st...
The virtual synchronous machine (VSM) has been a potential solution to control the grid-forming converters to integrate renewable energies (RES) into the grid. It is responsible for emulating the kinetic energy and static/dynamic properties of conventional synchronous generators to solve the stability problems due to decrease inertia in the systems with high levels of RES. This has been increasing in the distribution grids where is common the single-phase loads and the current unbalance, which causes stability problems as the intensified frequency oscillations and the frequency deviation in the system. The VSM control is common in converters present in the balance system. However, the VSM control implementation in converters present in the unbalanced system is not a straightforward task due as the unbalances intensify the power oscillations to cause the VSM to have abnormal behavior. Nevertheless, the frequency and voltage droops controls are commonly used in the converters present in the unbalanced system, but they are used as grid-following converters. Therefore, this paper proposes an auxiliary droop frequency and voltage control (AFV) scheme to integrate into a virtual synchronous machine (VSM-AFV) in order to improve a four-wire power system’s stability during an unbalanced system. This approach is based on droop frequency and voltage control, and its law control is obtained from a system’s active power and reactive power flow exchange equation. Changes in the active power of the VSM based on unbalances presented in the distribution grid are considered to show the performance of the VSM-AFV. Results show that the VSM-AFV controller presents lower ROCOF, steady-state errors in output reactive power, and output current of a four-leg three-phase voltage source converter (4-LVSC) when compared to the VSM approach.
A comparison of proportional-integral-derivative (PID) controller tuning for a 2x2 Multiple-Input Multiple-Output (MIMO) water treatment plant model is presented. The PID tuning procedures are based on Multi-Objective...
A comparison of proportional-integral-derivative (PID) controller tuning for a 2x2 Multiple-Input Multiple-Output (MIMO) water treatment plant model is presented. The PID tuning procedures are based on Multi-Objective Grey Wolf Optimizer (MOGWO) and Multi-Objective Grouped Grey Wolf Optimizer (MOGGWO) are performed under two different initial conditions. The tuning procedure is structured as a multi-objective optimization problem with four objective functions, the integral time-squared error is minimized in each output response, and the integral of the control actions is minimized in each input. MOGWO is a metaheuristic based on the hunting behavior of grey wolves, following the hierarchy and leadership procedures that these animals have, while the proposed MOGGWO is a new version proposed in this study with two different groups with different functionalities. The performance was analyzed by 50 runs based on statistical metrics. MOGGWO can find more local minima since its Pareto front is more dispersed than that found by MOGWO.
Brain-Computer Interface (BCI) is a technique that uses real-time brain impulses to connect with and control external devices. BCI provides a new method for controlling external devices by translating brain signals in...
Brain-Computer Interface (BCI) is a technique that uses real-time brain impulses to connect with and control external devices. BCI provides a new method for controlling external devices by translating brain signals into computer commands, facilitating the daily lives of people with disabilities and enhancing their ability to exhibit expected behavior. A Brain-Computer Interface (BCI) system based on Electroencephalography (EEG) was built to control the robotic arm. The EEG signals utilized included both eyes blinking, the right eye, the left eye, and the jaw contraction. EEG data were recorded from seven healthy subjects. The threshold approach is used to classify EEG signals, with the feature employed being the amplitude of the EEG signal. The highest threshold value for the blinking signal was 0.6 mV with an accuracy of 97.9%, while the best threshold value for jaw contraction was 0.4 mV with an accuracy of 93.34 percent. The healthy, inexperienced participants took part in system testing. The total results of testing each robot movement yielded an overall success rate of 84.52 percent. Therefore, it was determined that the system could facilitate the operation of the length robot even if the user lacked prior experience with EEG-based systems.
For large companies with branch offices spread across various regions, it is not enough to rely on traditional wide area network (WAN) technology to connect networks between data centers, head offices, and branch offi...
详细信息
Simultaneous multislice (SMS) imaging is a one of the acceleration technique of magnetic resonance imaging. SMS requires accurate sensitivity distributions in the slice plane for each receiving coil. This requirement ...
详细信息
This study introduces the system submitted to the SemEval 2022 Task 11: MultiCoNER (Multilingual Complex Named Entity Recognition) by the UC3M-PUCPR team. We proposed an ensemble of transformer-based models for entity...
详细信息
This paper aims to analyze passenger needs for network connectivity on the ship during traveling at the shipping line of Indonesian XYZ Company. The current connectivity infrastructure on board is supported by VSAT te...
详细信息
暂无评论