Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper describe the small signal stability of the load-frequency control with hydro-turbine. The effects of parameter variation on the dynamic behavior of the power system have been investigated. Application of compensation in response water turbine with eigenvalues analysis and behavior dynamic simulation of the power system is shown. Also, using transfer function, PID controller for load-frequency...
In this paper, new method for maximum power point tracking based on fuzzy controller has been presented that is maximum power point tracking with high power coefficient without requiring mechanical sensors and knowing system characteristics. Wind energy conversion system is simulated by using tracking system based on fuzzy controller in MATLAB/ SIMULINK and simulation results prove the advantages...
For multi-objective optimization problems, a common solution methodology is to determine a Pareto optimal set. However, the Pareto optimal set only pertains to deterministic results. Our research aims to introduce Pareto Uncertainty Index which reflects the stochastic nature of the problem in the results. The proposed method is applied to a simplified Generation Expansion Planning problem to test...
Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from...
In this paper, tuning and optimizing of a control system for a greenhouse lighting application is studied. PID controllers as one of the most common types of controllers in industrial and practical applications have been discussed by researchers and engineers for long period. Nowadays, usage of electrical energy for artificial light production in greenhouse environments is very common. Optimal and...
Normally power supplies provide a constant output voltage. A DC-DC converter in most of the applications is controlled by a voltage mode or a current mode controller. The DC converters are employed to feed electric vehicles, telephone sets and civil invertors, or for induction motors and frequency control. In this regard, optimal exploitation of DC transformed by classical controllers has been a controversial...
Nowadays, usage of artificial light as the supplemental light in greenhouse cultivations is one of the most common techniques to increase greenhouse productions. Greenhouse is part of the Smart Grid, where the activation of electricity energy market is applied. With Real-Time Pricing (RTP) of electricity energy, finding the optimum values of supplemental light for various cultivations and conditions...
In this work, we consider network intrusion detection using fuzzy genetic algorithm to classify network attack data. Fuzzy rule is a machine learning algorithm that can classify network attack data, while a genetic algorithm is an optimization algorithm that can help finding appropriate fuzzy rule and give the best/optimal solution. In this paper, we consider both well-known KDD99 dataset and our...
In this work, we consider detecting unknown or new network attack types with a Fuzzy Genetic Algorithm approach. The fuzzy rule is a supervised learning technique and genetic algorithm make fuzzy rule able to learn new attacks by itself. Moreover, this technique has high detection rate and robust. Therefore, we apply the fuzzy genetic algorithm approach to our real-time intrusion detection system...
While Internet and network technology have been growing rapidly, cyber attack incidents also increase accordingly. The increasing occurrence of network attacks is an important problem to network services. In this paper, we present a network based Intrusion Detection and Prevention System DPS), which can efficiently detect many well-known attack types and can immediately prevent the network system...
In this paper, a hybrid load frequency controller for a network with two-area interconnected power system is presented to damp the deviations in frequency and tie line power due to load changes in each time. The system includes DC control interacting with the conventional AC area controls. The stability of the network in these two areas is controlled by a new control method. This method is a Model...
In recent years, enterprise resources planning system is considered as powerful tool of acquiring competitive advantage in the organizations. However, the implementation of this system suffers from low success rate. One of the important issues in enterprise resource planning implementation is individuals' resistance and many implementation projects have been failed due to severe resistance. Therefore,...
A system reliability optimization approach with multiple k-out-of-n subsystems connected in series is presented. The design objective is to select multiple components to maximize system reliability while satisfying system requirement constraints such as cost and weight. Mixing of non-identical component types is allowed in each subsystem as well as at the system level. In practice, different design...
In this paper, we consider reliable traffic grooming in optical network design with multiple objectives. The objectives are to maximize average network reliability/availability and to minimize the number of switching ports required in optical networks. Maximizing the average connection availability of all traffic demands normally requires a large amount of resources (i.e., switching ports). In contrast,...
Crosstalk appears in various electrical circuits and chip design. This is due to stretches of overlapping wires that produce parasitic coupling between adjacent signal lines. In VLSI design, crosstalk creates a lot of problems. Crosstalk minimization problem is NP complete. The research is to find the solution with minimum crosstalk by using signal transition avoidance technique. We use simulated...
This paper considers a multi-objective network design problem for the traffic grooming, routing and wavelength assignment (GRWA) in WDM networks. The design objectives are to maximize the number of accepted communication requests (source-destination pairs) as well as to minimize the number of wavelength channel requirement. Both the design objectives are conflicted to each other; maximizing the number...
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the e-mail recipient. Spammers always try to find the way to avoid filtering out from the email system. At the same time, as an email recipient or network system/administrator, we try to have an effective spam mail filtering technique to catch the spam mails. The problems of spam mail filtering...
To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern of internet activities. We consider all network packets before they reach to the end-user by extracting a certain number of features of internet worm from these packets. Our network features...
Together with the extensive deployment of computer networks, the number of network attacks is greatly increasing. These attacks affect to availability and quality of services of the networks as well as confidentiality of private or important information data. In this paper, we present two network intrusion detection (IDS) techniques which are C4.5 decision tree and Ripper rules to assess and test...
Network design problem is usually complicated. Network designers may have to optimize various design objectives simultaneously. This paper considers a multi-objective network design problem for routing wavelength assignment (RWA) in WDM networks. The design objectives are to maximize the number of accepted communication requests (source-destination pairs) as well as to minimize the number of wavelength...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.