The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
6LoWPAN enables IoT and WSN devices to connect to the Internet. The traffic caused by this increase of machines connecting to the Internet can overwhelm networks, leading to congestion. SDN, with its architecture that decouples the control plane from the forwarding plane, provides novel ways of dealing with network congestion as it allows easier manipulation of the network and its traffic flow. Taking...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center complexity. By separating the control plane from the data plane, SDN introduces a new abstraction layer. This new abstraction layer is typically implemented by means of a so-called SDN controller. SDN applications can interact with the controller to ensure network functionality....
Q. How did your education and early career lead to your initial and continuing interest in the control field? Paulo: During my undergraduate studies, the subjects I enjoyed the most were always those that were mathematically more demanding. This narrowed down the choice of topics I wanted to pursue in my "licenciatura" thesis. I was fortunate to work on the control of the first Portuguese...
In this paper, we develop a system to support learning of OpenFlow by visually associating controller configuration information and logical topology. In our system, the constructed topology is visually shown on a touchscreen display and a learner can easily confirm the topology. In addition, a learner can configure the controller by visual and simple operation using the touchscreen display. Therefore,...
In this paper road marking recognition based on computer vision technology is considered. This system provides autonomous motion in public road of mobile robot that has kinematics of four-wheeled drive vehicle. As a result successful tests were taken on practice ground with road markings without considering static and dynamic obstacles. Obtained results prove the truth of offered solutions.
An imitating model for monitoring the work of a workshop that executes several technological processes was developed. Model was developed with usage of probability theory methods, mathematical statistics, and the theory of random processes. The model visualizes a certain set of states of the executed operations belonging to the technological process and allows user to track the percentage of failure...
Industrial Control System (ICS) is used to monitor and control critical infrastructures. Programmable logic controllers (PLCs) are major components of ICS, which are used to form automation system. It is important to protect PLCs from any attacks and undesired incidents. However, it is not easy to apply traditional tools and techniques to PLCs for security protection and forensics because of its unique...
In modern train control systems, a moving train retrieves its location information through passive transponders called balises, which are placed on the sleepers of the track at regular intervals. When the train-borne antenna energizes them using tele-powering signals, balises backscatter preprogrammed telegrams, which carry information about the train's current location. Since the telegrams are static...
The interplay between an intrusion detection mechanism and a false data injection mechanism is investigated in this work in the context of an infinite horizon Linear Quadratic Gaussian Control System (LQG). A game theoretic framework is proposed between the attacker, who wishes to impair the operation of the control system while remaining stealthy, and the detector, who wishes to detect the presence...
The problem of ensuring the safety of passengers waiting for public passenger transport at a halting point is considered. In addition, due to the large number of vehicles in the streets and road networks of cities, the lack of parking spaces, there is a problem of parking at bus stops. In order to solve the above problems, it is suggested to equip a bus stop with the necessary equipment for admission...
Nowadays, home devices with network capabilities are widely used. The technology integration offers new and exciting opportunities to increase the device connectivity within a home for many proposals of home automation. In this paper, it has been developed a framework that allows to quickly develop new hardware and software complex systems, rapidly integrate new classes of devices in existing systems...
The paper presents an approach to the synthesis of MV control systems with respect to minimum-energy of the control inputs. Due to the reason, a recently introduced polynomial matrix σ-inverse is applied to LTI nonsquare systems described by discrete-time state-space framework. It is shown that classical minimum-norm right inverse is not sufficient to obtain the minimum-energy of control runs. Thus,...
In the modern joint war, the weapon systems portfolio selection is a necessary procedure for military development and research. The research on weapon system portfolio selection has made some achievements. Generally, the multi-objective programming methods and some intelligent algorithms are used to solve the problem. In this paper, the fuzzy clustering analysis and the maximum deviation methods are...
Modular Cascade Machines (MCM) is a system where integrating several modular designed machines to replace the conventional single machine, and gradually attracted worldwide attentions in recent years. It may have perspectives in the applications of Electrical Vehicles (EVs). This paper developed a possible MCM torque distribution strategy, by the means of Adaptive Network based Fuzzy Interface System...
In 2013, Mao initiated the study on the stabilization of continuous-time hybrid stochastic differential equations by feedback controls based on discrete-time state observations. In this paper, we will extend the theory to deal with the robust discrete-state-feedback stabilization problem for hybrid stochastic systems with time-varying delay. By employing the Razumikhin technique, delay-dependent criterion...
This paper proposes a three-phase grid- connected PV system based on dual-active-bridge (DAB) converters and cascaded multi-level DC/AC converters (CMCs). PV array strings will be connected to DAB converters which will be collected in series by the CMC. In this system, the output power of the PV arrays will be unbalanced once the operating states of the PV arrays are not identical. The unbalanced...
In order to supplement the saaty's consistency theory of judgment matrix, the experts’ psychological expectation of the comparative scale values is studied. The omission of the saaty's consistency theory is analyzed. An innovative consistency definition of judgment matrix is proposed. A matrix adjustment method is developed from this definition. This method is compared with the existing methods from...
The authors study the second-order finite-time coordination problems of nonlinear multi-agent systems with directed graph. By using the homogeneous theories, we firstly give a finite-time coordination controller for the leaderless multi-agent system. Then, another finite-time controller for leader-follower multiagent system was given. Finally, the authors give a simulation, which shows the effectiveness...
Each commit in repositories of version control systems should include code changes for only a single task. However, in real repositories, there are many commits for multiple tasks and tasks split into multiple commits. We call the latter split commits. In this research, we firstly investigate how many and what kinds of split commits are included in repositories. Then, we classify the found split commits...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.