In electrical power systems, the coordination of protections in time domain is important and difficult problem. The time settings of protection relays have to be adapted to the time characteristics of electrical power...
详细信息
The subject matter of the study are the automated guided vehicle (AGV) operation synchronisation mechanisms in flexible manufacturing systems, enabling determination of the travel schedules via some preset travelling ...
详细信息
In electrical power systems, the coordination of protections in time domain is important and difficult problem. The time settings of protection relays have to be adapted to the time characteristics of electrical power...
详细信息
In electrical power systems, the coordination of protections in time domain is important and difficult problem. The time settings of protection relays have to be adapted to the time characteristics of electrical power system plants and the delay times of the other protections. In the paper, Fault Trees with Time Dependencies (FTTDs) are used in selection of values of the delay times of primary (local) and remote backup protections. In the FTTD, events and gates are characterized by time parameters. These time parameters are derived from the time characteristics of protection devices and the inherent delay times of protection equipment.
This paper juxtaposes performance of the grammar- based classifier system (GCS) with tabular representation algorithm (TBL) on the task of inducing context-free grammars from partially structured examples. In both cas...
详细信息
This paper juxtaposes performance of the grammar- based classifier system (GCS) with tabular representation algorithm (TBL) on the task of inducing context-free grammars from partially structured examples. In both cases structured examples rapidly improve the efficiency of learning algorithms, although there are substantial differences in the way they work. GCS requires more attention while setting initial system parameters and structured examples provide a bit more information than in TBL but on the other hand it is more efficient when tested against the same examples' sets.
It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in ca...
详细信息
It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in case of cryptographic devices, such as smart cards or crypto-processors, errors may also leak some secret information hidden in the device (e.g. encryption keys). This was presented for almost all cryptographic protocols and algorithms allowing an adversary to perform a fault analysis. Therefore it is urgent to propose hardware implementation of cryptographic algorithms that will be immune to this type of attack. Some solutions to this problem have been already proposed for the RSA algorithm based on the Chinese Reminder Theorem and for symmetric algorithms. On the other hand there is a large number of algorithms that are susceptible to fault analysis but no solutions to increase immunity have been proposed so far.
A method of reliability and functional analysis related to discrete transport systems is presented. The proposed analysis is based on modeling and simulating of the system behavior. Monte Carlo simulation is used for ...
详细信息
A method of reliability and functional analysis related to discrete transport systems is presented. The proposed analysis is based on modeling and simulating of the system behavior. Monte Carlo simulation is used for proper reliability and functional parameters calculation. The simulator is built using Scalable Simulation Framework (SSF). No restriction on the system structure and on a kind of distribution is the main advantage of the method. The paper presents some exemplar system modeling. The authors stress the problem of influence of the reliability parameters for final system functional measures (required time of delivery). They also propose to measure the economic quality of discrete transport system by "profit function". The presented problem is practically essential for defining an organization of vehicle maintenance and transport system logistics.
The paper presents the model of automatic detection system which uses fuzzy logic methodology for intrusion detection and analysis in sophisticated distributed system. The proposed system functions are to detect the o...
详细信息
The paper presents the model of automatic detection system which uses fuzzy logic methodology for intrusion detection and analysis in sophisticated distributed system. The proposed system functions are to detect the occurrence of intrusions, their severity and impact on the system work. The authors indicate that the current system reveals to be experimental in nature. We propose the hierarchical agent architecture to increase the detection response speed and scalability of the system.
The problem of Input Output Decoupling is studied for the case of general neutral multi-delay systems, via proportional realizable output feedback. Using a pure algebraic approach, the necessary and sufficient conditi...
详细信息
In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a...
详细信息
In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a new key distribution protocol for large and dynamic ad hoc networks over unreliable channel. Protocol proposed here involves broadcast exclusion based on polynomial interpolation and secret key cryptography. Proposed scheme ensures security of broadcast and one-to-one communication, message authentication and gives a possibility to verify routing information. It also ensures t-resilience which means that up to t nodes can be compromised without influencing the security
The necessary and sufficient conditions for the solvability of the exact model matching problem for general neutral single input - single output multi-delay systems, via a realizable dynamic output feedback and a real...
详细信息
暂无评论