Abstract: Contingency analysis plays a vital role in assessing power system security and operations. This research examines the effects of replacing a synchronous generator with a Doubly Fed Induction ...
Abstract: Despite neuromorphic computing (NC) technologies offer tremendous potential in executing computationally intensive tasks with high efficiency and low latency, most of existing methods are ...
Abstract: This paper presents a detailed comparative analysis of conventional and AI-driven Maximum Power Point Tracking (MPPT) techniques utilized in photovoltaic (PV) systems. The study evaluates ...
Abstract: Low earth orbit (LEO) satellites provide the potential to overcome the current limitations in global navigation satellite systems (GNSSs) due to the increased satellite velocity and signal ...
Abstract: Intrusion Detection Systems (IDS) are critical components in securing network environments against a myriad of cyber threats. The evolution of machine learning (ML) techniques has ...
Abstract: In the strapdown inertial navigation system (SINS), which is based on a high-precision rotary table for system-level calibration, the complexity of the transposition scheme and the long ...
Abstract: In recent years, the biochip sensor has gained significant attention for its extensive utilization in drug screening, biochemical pathway profiling, and genetic sequencing. The barcode-array ...
Abstract: Systems of Systems (SoS) are complex entities characterized by the integration of multiple autonomous systems with intricate interdependencies. This paper analyzes the limitations of ...
Abstract: Fully actuated system (FAS) approach was proposed in 2020 and 2021 as a general framework for control system analysis and design based on a newly discovered general type of fully actuated ...
Cascading Failure in Cyber–Physical Systems: A Review on Failure Modeling and Vulnerability Analysis
Abstract: Cascading failures pose a significant security threat to networked systems, with recent global incidents underscoring their destructive potential. The security threat of cascading failures ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results