A good management of consumption by reactive power control reveals economical aspects. The current European scheme is intended to encourage consumers to minimize reactive power consumption. Energy providers usually request additional costs for business customers who have a power factor lower than a certain limit. Engineers have a lot of interest in the power factor of a load as one of the factors...
Taking security management of Software-Defined Networking (SDN) into consideration, the identification of attacks due to the SDN-specific vulnerabilities is of great significance. Thus in this case, formalization of security attacks becomes essential in promoting the identification process of attacks. This paper then proposes an integrated approach of attack trees and extension innovation methods...
Grey Wolf Optimizer (GWO) is a new meta-heuristic optimization. It is inspired by the unique predator strategy and organization system of grey wolves. Since the GWO algorithm is easy to fall into local optimum especially when it is used in the high-dimensional data, an improved GWO algorithm combined with Cuckoo Search (CS) is proposed in this paper. By introducing the global-search ability of CS...
The article proposes a new method of digital loop control based on the sharing of digital PID control formula, characterized by preventive assessment of the control object during each control cycle to select the control action. The selected control action for a subsequent control cycle corresponds to the discrete PID control formula that will ensure the best dynamics control parameter during the next...
In order to expand the class of control objects that require executing the complex regulation law, the author proposes a new method of organizing computing activities on the basis of the principle of non-use of the half-adder, the method implies the formation of all the digits of the result during one cycle of machine time. Mathematical models, which organize computations of methodically maximum speed,...
Cloud computing and cloud storage systems are being used more and more in a variety of domains, from everyday user applications like healthcare monitoring systems and intelligent buildings to military devices. The deployment of these frameworks also enables modern control and automation paradigms found in cyber-physical systems and Industry 4.0. Driven by exponential decreases in computing and storage...
Model oriented testing methods are known relatively long time, but the right time for viable deployment is coming up now with the continuously growing amount of vehicle electronic systems. Paper proposes a new Model-Based Testing approach to testing of automotive electronics systems. The key concept is the utilization of Timed Automata for online testing of automotive electronic control units. System...
We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence...
In this paper is suggested the design of a scheduler for the resources control of the distributed computer system based on a network-centric approach. There is considered the distributed computer system which is a set of heterogeneous computing nodes, been connected by heterogeneous data transmission channels and these channels are multi-channels by their nature. The scheduler for such distributed...
A non-contact technique for measurement of geometric dimensions and positions in the monochrome light is presented along with the assessment of measurement performance by automatic processing of measurement.
On the basis of Ukrainian university experience the project management methodology for the provision of educational services to the foreign customer was developed. In this methodology the general calculation of a quantitative assessment of the quality of teaching is applied. To significantly reduce the time for calculations, the universal computing program has been created. It allows to process extensive...
A paper is devoted to the management of innovative projects based on the theory of fuzzy sets. To analyze project risks based on the terms of their implementation — acceleration, according to the plan and with the delay, authors proposed to employ both the asymmetry coefficient and the coefficient of asymmetry variation which are characterizing the asymmetric distribution of costs due to changes in...
This paper outlines the results that can be obtained when the top and bottom compositions of a propylene/propane distillation column are controlled using two Proportional-Integral (PI) controllers tuned with Genetic Algorithms (GA). The process is nonlinear and the PI controllers must consider this aspect, to get the best performance. In this paper the case of multi-model control is considered as...
The creation of intrusion detection systems for IoT scenarios presents various challenges. One of them being the need for an implementation of unsupervised learning and decision making in the detection syste1m. The algorithm presented in this paper is capable of definitively identifying a large percentage of possible intrusions as true or false without the need of operator input. Our proposal is based...
The authors propose the agent-oriented approach for solving problems of IT project planning. The tasks hierarchy of a management planning system in IT projects is formed. Both the use case and context diagram of processes in project management planning are built. The simulation model of the multi-agent system on AnyLogic base is studied.
Model-Based Testing is a testing approach used for automated test generation, execution, and evaluation. It is based on a formal behavioral model of the tested system. This paper presents a new test generation method that utilizes an advanced variant of Petri nets for a description of the systems under test and Constraint programming for tests generation. The presented method aims for modeling and...
The nonlinear plants with significant time delays are difficult to be controlled by classical means. In the present paper intelligent approaches are applied for the design of a nonlinear Smith predictor for compensation of the plant time delay based on a Takagi-Sugeno-Kang plant model and a fuzzy logic parallel distributed compensation (PDC). The design and the advantages of the PDC-Smith are illustrated...
The advances made in the field of IoT in recent years implore us to take a closer look at the security challenges it presents. Due to its ubiquitous nature and high heterogeneity of the connected devices and communication protocols a novel approach must be taken. This papers aim is to make a brief review of the work done in the areas of Negative Selection and Danger Theory and to do a comparative...
Biosensor systems (BSS) have been examined like object of diagnostic with all their parameters and their characteristics being analyzed. For example the known generalized parameter Thile's module, depends on constructive parameters of the biosensors and reflects their technical characteristics. The factor of accuracy is another generalized indicator reflecting mainly metrological characteristics....
Presents the copyright information for the conference. May include reprint permission information.