The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Residential networks are home to increasingly diverse devices, including embedded devices that are part of the Internet of Things phenomenon, leading to new management and security challenges. However, current residential solutions that rely on customer premises equipment (CPE), which often remains deployed in homes for years without updates or maintenance, are not evolving to keep up with these emerging...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
In this paper, we propose two simple and practically feasible countermeasures to address the Route Spoofing and Resource Exhaustion attacks in Software Defined Networking (SDN) scenarios. For Route Spoofing attack, we introduce a new technique called “selective blocking” which blocks an adversary node to use a genuine user's active routes, and for Resource Exhaustion attack, we propose a “periodic...
This paper proposes an asynchronous cycle circuit by providing Click element and joint module rather than clock-domain. The asynchronous mode of operation re-uses the simple asynchronous control protocols, takes full advantage of characteristics of Click, and commendably inherits the elasticity of the asynchronous micropipeline. The circuit in this paper has some individual coin. As a result, we can...
In this research, controller for wind turbine capable of generating electricity even at low wind speeds is developed. The employed small vertical axis wind turbine has the capability of generating power at low wind speeds. However, the charging battery under low wind speeds is difficult because the terminal voltage of the generator cannot be kept high enough. To solve this problem, charge operation...
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
This paper proposes a class of optimal and robust controller for the islanded AC microgrid (MG) system which is composed of wind turbine generator (WTG), photovoltaic generator (PV), fuel cell (FC), micro turbine (MT), battery energy storage (BES) and loads. The proposed controller has two main functions: rationally utilizing MT, FC and BES, and regulating the AC bus frequency deviation. For such...
This paper investigates the problem of the fault isolation for Takagi-Sugeno (T-S) fuzzy systems. Based on set theory, the residual signal can be unaffected by the fault, which is to be isolated, then, the fault can be isolated successfully. In addition, the fault isolation performance can be enhanced by considering H−/H∞ performance index. Furthermore, based on the linear matrix inequalities (LMIs)...
How to design an optimal mixed H2/H∞ robust FID controller for a complex control system is of great practical importance, but it is still an open issue. From the perspective of evolutionary algorithm, this paper formulates this issue firstly as a typical constrained optimization problem by minimizing a weighted objective function consisting of the robust stability performance, disturbance attenuation...
The migration of railway communication technology from GSM-based to LTE-based has been decided by International Union of Railway. This means that a future train control system will be one based on LTE accordingly. For the highest reliability of train operation in such a system, a fully duplicated network structure with overlaid radio cells is needed. Existing methods and results are often relied on...
The role of inertia emulation and voltage control is fundamental to support the integration of distributed generation in weak power grids and Virtual Synchronous Machines (VSMs) represent an attractive solution to assume both of these roles. However, VSMs act as voltage sources and this makes it difficult to address power quality issues. Virtual impedances are commonly applied in the literature to...
This paper considers the concept of building a high speed multivalued elements and structures, where the characteristics are defined by the basis vectors. Has been showed that any real device can be interpreted as a multi-valued electronic circuit, and can be explained by differential equations system in the most comprehensive view and allows exploring all aspects of the behavior of the device or...
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center complexity. By separating the control plane from the data plane, SDN introduces a new abstraction layer. This new abstraction layer is typically implemented by means of a so-called SDN controller. SDN applications can interact with the controller to ensure network functionality....
The mining of software repositories has provided significant advances in a multitude of software engineering fields, including defect prediction. Several studies show that the performance of a software engineering technology (e.g., prediction model) differs across different project repositories. Thus, it is important that the project selection is replicable. The aim of this paper is to present STRESS,...
Robust finite-time (FT) stabilization of uncertain continuous-time singular systems is of concern in this paper. By adopting a Lyapunov-like functional (LLF) and the finite-time stability (FTS) technique, the linear matrix inequality (LMI)-based conditions are derived for uncertain continuous-time singular systems to be stabilizable. Then, based on solving these LMIs, a FT H-infinite state feedback...
In this paper, the problem of exponential synchronization of Chaotic Lur'e systems with sampled-data control is investigated. It's noted that the sampling periods are arbitrarily varying and bounded. A novel Lyapunov functional is proposed which takes full advantage of the available information about the actual sampling patterns. A linear matrix inequality method is utilized to design the sampled-data...
This paper propose an asynchronous impulsive control scheme for consensus of second-order multi-agent systems. The proposed control scheme do not require time synchronization among agents. Each agents has its won clock to determine the impulsive instants. By using discretization approaches and the stochastic matrix theory, it is find that the stability of the proposed control scheme depends on the...
This paper addresses the robust non-fragile leader-following consensus problem for multi-agent systems against state-dependent uncertainties and controller coefficient variations. Without the requirement of knowledge of uncertainties of agents and controllers, adaptive distributed controllers are constructed to guarantee the follower agents tracking the leader agent. Asymptotic consensus results of...
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
There is little work which empirically analyses network management practice with respect to policy creation and maintenance. To address this gap we carried out five semistructured interviews of network administrators at a diverse range of enterprises. Analysis of the results led us to make the following contributions: We introduce a number of high-level orthogonal concepts (dimensions) for representing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.