Buscar
Mostrando ítems 1-10 de 363
An attack signature model to computer security intrusion detection
(2002-12-01)
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of ...
An attack signature model to computer security intrusion detection
(2002-12-01)
Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of ...
Implementation of an electronic card system in ColombiaImplementación de un sistema de cédula electrónica en Colombia
(Universidad de Costa Rica, 2023)
Development of a hybrid system for automatic identification of brushed direct current motors
(Institute of Electrical and Electronics Engineers Inc., 2020-09-01)
This work proposes a low-cost hybrid hardware and software system that, through a set of methods and nested while loop fitting algorithms, allows to automatically identify the electrical and mechanical parameters of a ...
Autonomous Flight of a Commercial Quadrotor
(Institute of Electrical and Electronics Engineers, 2014-08)
In this paper we describe a controller and sensor fusion algorithm for a low-cost commercial quadrotor helicopter and its implementation in ROS. The dynamics of the system is assumed decoupled and identified as four SISO ...
Open-Circuit Fault Identification Method for Interleaved Converters Based on Time-Domain Analysis of the State Observer Residual
(Institute of Electrical and Electronics Engineers, 2018-07-05)
Fault-tolerance capability is a critical matter in power conversion systems that require continuous operation. Multiphase converters provide an inherent redundancy that gives them fault-tolerant capability. In addition, ...
Identificação tipológica de processos judiciais: um caso de cultura de sigilo versus cultura de acesso
(Universidade Federal de Santa MariaBrasilAdministraçãoUFSMPrograma de Pós-Graduação em AdministraçãoCentro de Ciências Sociais e Humanas, 2016-05-30)
Since the enactment of the Federal Law No. 11,419 of December 19, 2006, the Brazilian Courts, within each
branch of justice, began scanning physical processes becoming digitized and those born-digital processes.
In this ...
Probabilistic invariant sets for Closed-Loop re-identification
(Institute of Electrical and Electronics Engineers, 2016-06)
Recently, a Model Predictive Control (MPC) suitable for closed-loop re-identification was proposed, which solves the potential conflict between the persistent excitation of the system and the stabilization of the closed-loop ...