Abstract: Contingency analysis plays a vital role in assessing power system security and operations. This research examines the effects of replacing a synchronous generator with a Doubly Fed Induction ...
Abstract: Despite neuromorphic computing (NC) technologies offer tremendous potential in executing computationally intensive tasks with high efficiency and low latency, most of existing methods are ...
Abstract: This paper presents a detailed comparative analysis of conventional and AI-driven Maximum Power Point Tracking (MPPT) techniques utilized in photovoltaic (PV) systems. The study evaluates ...
Abstract: Low earth orbit (LEO) satellites provide the potential to overcome the current limitations in global navigation satellite systems (GNSSs) due to the increased satellite velocity and signal ...
Abstract: Intrusion Detection Systems (IDS) are critical components in securing network environments against a myriad of cyber threats. The evolution of machine learning (ML) techniques has ...
Abstract: In the strapdown inertial navigation system (SINS), which is based on a high-precision rotary table for system-level calibration, the complexity of the transposition scheme and the long ...
Abstract: In recent years, the biochip sensor has gained significant attention for its extensive utilization in drug screening, biochemical pathway profiling, and genetic sequencing. The barcode-array ...
Abstract: Systems of Systems (SoS) are complex entities characterized by the integration of multiple autonomous systems with intricate interdependencies. This paper analyzes the limitations of ...
Abstract: Fully actuated system (FAS) approach was proposed in 2020 and 2021 as a general framework for control system analysis and design based on a newly discovered general type of fully actuated ...
Abstract: Cascading failures pose a significant security threat to networked systems, with recent global incidents underscoring their destructive potential. The security threat of cascading failures ...