In this paper a pole-placement method for nonlinear systems is proposed. It is based on a recently introduced technique which approximates the solution of a nonlinear system by a sequence of linear time-varying system...
详细信息
The digital phase system for the automatic phase lock of a resonance inverter that feeds into an inductor system is studied. The transient processes that develop if the circuit frequency changes are considered. A meth...
详细信息
Purpose: As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environ...
详细信息
Purpose: As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environment. Many recorded industrial cyber-attacks have successfully beaten technical security solutions by exploiting human-factor vulnerabilities related to security knowledge and skills and manipulating human elements into inadvertently conveying access to critical industrial assets. Knowledge and skill capabilities contribute to human analytical proficiencies for enhanced cybersecurity readiness. Thus, a human-factored security endeavour is required to investigate the capabilities of the human constituents (workforce) to appropriately recognise and respond to cyber intrusion events within the industrial control system (ICS) environment. Design/methodology/approach: A quantitative approach (statistical analysis) is adopted to provide an approach to quantify the potential cybersecurity capability aptitudes of industrial human actors, identify the least security-capable workforce in the operational domain with the greatest susceptibility likelihood to cyber-attacks (i.e. weakest link) and guide the enhancement of security assurance. To support these objectives, a Human-factored Cyber Security Capability Evaluation approach is presented using conceptual analysis techniques. Findings: Using a test scenario, the approach demonstrates the capacity to proffer an efficient evaluation of workforce security knowledge and skills capabilities and the identification of weakest link in the workforce. Practical implications: The approach can enable organisations to gain better workforce security perspectives like security-consciousness, alertness and response aptitudes, thus guiding organisations into adopting strategic means of appropriating security remediation outlines, scopes and resources without undue wastes or redundancies. Originality/value: This paper demonstrat
Camera calibration represents an important step in 3D reconstruction process. A lot of linear camera calibration techniques exist which try to compute the camera intrinsic and extrinsic parameters with a close form so...
详细信息
ISBN:
(纸本)188933524X
Camera calibration represents an important step in 3D reconstruction process. A lot of linear camera calibration techniques exist which try to compute the camera intrinsic and extrinsic parameters with a close form solution. This close form solution arise form the minimization of a linear cost function. Since the noise in the points' coordinates, the computed parameters are an approximation of the real ones. Therefore, this cost function can include some restrictions in order to improve the robustness of the algorithm. In this paper a summary of the most important linear camera calibration techniques is done. Afterwards, an evaluation of its performance is carried out. This evaluation is done from the point of view of the parameters which have more influence in the results. These are the number of points and the noise level.
Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important challenge in Boolean networks is to exhaustively find attractors,which repre...
详细信息
Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important challenge in Boolean networks is to exhaustively find attractors,which represent steady states of a biological network. In this paper, we propose a new approach to improve the efficiency of BDD-based attractor detection. Our approach includes a monolithic algorithm for small networks,an enumerative strategy to deal with large networks, a method to accelerate attractor detection based on an analysis of the network structure, and two heuristics on ordering BDD variables. We demonstrate the performance of our approach on a number of examples and on a realistic model of apoptosis in hepatocytes. We compare it with one existing technique in the literature.
The research work presents a original solution for increasing the efficiency on management Supplied-Customer Services (SCS), based on a causal graph configuration. This approach expresses the connection, interaction, ...
详细信息
In this paper a practical new approach to the topic of guarantee closed loop stability of constrained predictive controllers is proposed. The problem is addressed for the case when, due to disturbances, inadequate con...
详细信息
Alternative parameterisations have been shown to improve the feasible region for a predictive control law when the number of degrees of freedom is limited. One question yet to be resolved is: which alternative paramet...
详细信息
Camera calibration process is very sensitive to noise. Errors' coming from noisy measurements of the points coordinates, their situation in the world and the calibration algorithm itself creates a deviated solutio...
详细信息
ISBN:
(纸本)188933524X
Camera calibration process is very sensitive to noise. Errors' coming from noisy measurements of the points coordinates, their situation in the world and the calibration algorithm itself creates a deviated solution from the real one. Therefore, it is more interesting to obtain the standard deviation and the mean value of a parameter, than only a value. This value is always false because of the input data is corrupted with noise. This standard deviation represents the quality of the computed parameter. In this paper a method to compute this standard deviation of the projection matrix elements is presented. In this case, the projection matrix is computed with the non homogeneous solution based on the least squares technique.
暂无评论