Results (2367)
Search Parameters:
Keyword: REMinimum Static VAR Compensation Capacity for Bad Voltage Drop Buses in Power Systems
The quality of the electric power system must be maintained properly, one of which is voltage. Under certain operating conditions, the bus voltage may drop below its minimum level, called bad voltage. A large reactive load can cause a voltage drop across the bus or the location of the bus is far from the generator…
Read MoreDesign and Comparative Analysis of Hybrid Energy Systems for Grid-Connected and Standalone Applications in Tunisia: Case Study of Audiovisual Chain
In this research paper, a technical and economic-environmental study was developed to investigate the possibility of establishing various hybrid power systems with different operation modes. Grid-connected and standalone hybrid systems (solar-wind with storage batteries and diesel generators) have been realized in order to carry out a comparative analysis study of two configurations. These systems have…
Read MoreSocial Financial Technologies for the Development of Enterprises and the Russian Economy
The main contradiction identified in the study is that the existing scientific and methodological solves of economy development management processes does not create prerequisites for improving the efficiency of their work, the introduction of progressive technologies for material and moral stimulation of the work of performers and administrative and managerial personnel, advanced social mechanisms for…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreDetecting the Movement of the Pilot’s Body During Flight Operations
This research presents a “Multi-camera for pilot’s cockpit measurement system”, which uses four multi-view images to eliminate the instrument and human body shielding and record the touched area. That could record the body reaction time (velocity and acceleration) and trajectory of the tested personnel. Real-time conversion of multi-view images corresponding to the 3D skeletal joint…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreChallenges Facing Solar Panel Energy Deployment within Qatari Homes and Businesses
Despite many factors conducive to renewable energy investment in Qatar (e.g., the fact that the state is a major gas exporter whose long-term prosperity depends on economic diversification), there is very low uptake of solar panel adoption among home and business owners. Major challenges implicitly face the deployment of solar and other renewables in Qatar,…
Read MoreMultiple Criteria Decision-making: Risk Analyses for the Soft Target
This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…
Read MoreDevelopment of an Intelligent Road Anomaly Detection System for Autonomous Vehicles
Globally, road transportation has become one of the most reliable means of moving goods and services from one place to the other. It has contributed immensely to the standard of living and modern civilization. However, this means of transportation is characterised by some issues which are poised to be harmful to the human population if…
Read MoreActive Simulation of Grounded Parallel-Type Immittance Functions Employing VDBAs and All Grounded Passive Components
This communication proposes a grounded immittance function simulator that, depending on the proper choice of the passive components, can simulate parallel-type impedances of the R-L, R-C, and L-C forms. Only two grounded passive components and two voltage differencing buffered amplifiers (VDBAs) are used to implement the suggested circuit. All three simulated equivalent elements, namely Req,…
Read MoreNorthern Leaf Blight and Gray Leaf Spot Detection using Optimized YOLOv3
Corn is one of the most important agricultural products in the world. However, climate change greatly threatens corn yield, further increasing already prevalent diseases. Northern corn leaf blight (NLB) and Gray Leaf Spot are two major corn diseases with lesion symptoms that look very similar to each other, and can lead to devastating loss if…
Read MoreMetaheuristic Optimization Algorithm Performance Comparison for Optimal Allocation of Static Synchronous Compensator
The relevance of static synchronous compensator (STATCOM) controllers in controlling power network parameters is causing them to be included in contemporary networks. But for the intended objectives to be attained, the best device positioning and parameter settings are essential. This work compares the performance of the particle swarm optimization (PSO) and firefly algorithm (FA) in…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreConception and Simulation of an Electronic Nose Prototype for Olfactory Acquisition
The “Electronic Nose” approach, which is exclusive to gas measurement systems, uses gas sensors as odor detectors. Design faults exist in the existing electronic nose (e-nose) chamber, such as its large volume, difficult construction, etc. In order to obtain measurements in a satisfactory state, we want to create a gas chamber that can provide favorable…
Read MoreIntegrated GIS-SUE Map Cost Estimation System Prototype for Designing a Decision Support System
Subsurface Utility Engineering (SUE) is an international model for mapping and classifying underground surfaces according to their accuracy (acquisition method). Utilizing Geographic Information System (GIS) to map and present the SUE levels paved the way for producing a new Decision Support System (DSS) for the utility mapping process. The proposed system represents an efficient tool…
Read MoreOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreAn Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand
Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…
Read MoreCharacterization and Investigating the Effect of Gate-Insulator Thickness on Co-Axial Cylindrical Carbon Nanotube Field Effect Transistor
Carbon nanotube field effect transistor (CNTFET) has a huge advantage over the Si- MOSFET. In MOSFET switching occurs by altering channel resistivity whereas in CNTFET switching occurs by modulation contact resistance. CNTFET generates three to four times of drive current than MOSFET. Transconductance of CNTFET is four times higher than the MOSFET. The average carrier…
Read MoreOptimizing Sensors Locations for Tsunami Warning System
To reduce the time necessary for determination of tsunami source parameters it is proposed to optimize the location of sensors system and to use only a part of the measured wave profile. Based on computation, it is possible to balance the number of sensors in use and the time period after the earthquake needed to…
Read MoreDesign and Analysis of a Virtual Synchronous Generator Control Scheme to Augment FRT Capability of PMSG-Based Wind Turbine
Massive integration of inverter dominated renewable energy systems (RESs), i.e., wind turbines (WTs), reduces the reliance on conventional alternator-based power stations. The system inertia and damping aspects of the power system were significantly decreased by this extensive integration of inverter-based WT system, which impacts on the fault ride-through (FRT) competence and thus precipitates the frequency…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreDesigning the MIMO SDR-based Antenna Array for 5G Telecommunication
With the significant spread of 5G telecommunication systems, the demand for high quality of service and better coverage is growing rapidly. Multiple-input–multiple-output is planned to be among the key technologies in 5G telecommunication’s field. In this article, a new fully digital 2×2 MIMO testbed is implemented, using USRP B210 and 2 pairs of microstrip antennas…
Read MoreDeveloping CubeSat and AI Framework for Crowd Management Case of Short-Term Large-Scale Events
Many consequences can be resulted in mismanagement of crowd, which might get people injured or even lose their lives. Thus, crowd management helps in controlling overcrowded areas during events, and allowing authorities to monitor, manage and reduce incidents. Space science and technology have made huge leap in crowd management, let alone when this technology integrated…
Read MoreBangla Speech Emotion Detection using Machine Learning Ensemble Methods
Emotion is the most important component of being human, and very essential for everyday activities, such as the interaction between people, decision making, and learning. In order to adapt to the COVID-19 pandemic situation, most of the academic institutions relied on online video conferencing platforms to continue educational activities. Due to low bandwidth in many…
Read More
