This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity fa...This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the di...The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this stud...The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.展开更多
Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for manag...Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.展开更多
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl...Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.展开更多
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.展开更多
The article synthesizes and presents the results regarding the stability of positive homogeneous systems that have been researched and published in recent years. Next, we provide a sufficient condition for global expo...The article synthesizes and presents the results regarding the stability of positive homogeneous systems that have been researched and published in recent years. Next, we provide a sufficient condition for global exponential stability in the case of discrete-time positive homogeneous systems with an order less than one with time-varying delays.展开更多
The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficultie...The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.展开更多
Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a...Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a need to look at ways that can augment conventional Vehicular Management Information Systems (VMIS) in transforming business processes through Telematics. This paper aims to contextualise the role that telematics can play in transforming the Insurance Ecosystem in Zimbabwe. The main objective was to investigate the integration of Usage-Based Insurance (UBI) with vehicle tracking solutions provided by technology companies like Econet Wireless in Zimbabwe, aiming to align customer billing with individual risk profiles and enhance the synergy between technology and insurance service providers in the motor insurance ecosystem. A triangulation through structured interviews, questionnaires, and literature review, supported by Information Systems Analysis and Design techniques was conducted. The study adopted a case study approach, qualitatively analyzing the complexities of the Telematics insurance ecosystem in Zimbabwe, informed by the TOGAF framework. A case-study approach was applied to derive themes whilst applying within and cross-case analysis. Data was collected using questionnaires, and interviews. The findings of the research clearly show the importance of Telematics in modern-day insurance and the positive relationship between technology and insurance business performance. The study, therefore revealed how UBI can incentivize positive driver behavior, potentially reducing insurance premiums for safe drivers and lowering the incidence of claims against insurance companies. Future work can be done on studying the role of Telematics in combating highway crime and corruption.展开更多
Refugee settlements face several challenges in transitioning from a temporary planning approach to more sustainable settlements. This is mainly due to an increase in the number of forcibly displaced people over the la...Refugee settlements face several challenges in transitioning from a temporary planning approach to more sustainable settlements. This is mainly due to an increase in the number of forcibly displaced people over the last few decades, and the difficulties of sustainably providing social services that meet the required standards. The development of refugee settlements assumed that forcibly displaced people would return to their places or countries of origin. Unfortunately, displacement situations are prolonged indefinitely, forcing these people to spend most of their lives in conditions that are often deplorable and substandard, and therefore unsustainable. In most cases, the establishment of refugee settlements is triggered by an emergency caused by an influx of forcibly displaced people, who need to be accommodated urgently and provided with some form of international assistance and protection. This leaves little or no time for proper planning for long-term development as required. In addition, the current approach to temporary settlement harms the environment and can strain limited resources with ad hoc development models that have exacerbated difficulties. As a result, living conditions in refugee settlements have deteriorated over the last few decades and continue to pose challenges as to how best to design, plan, and sustain settlements over time. To contribute to addressing these challenges, this study proposes a new methodology supported by Model-Based Systems Engineering (MBSE) and a Systems Modeling Language (SysML) to develop a typical sustainable human settlement system model, which has functionally and operationally executed using a Systems Engineering (SE) approach. To assess the sustainability capacity of the proposed system, this work applies a matrix of crossed impact multiplication through a case study by conducting a system capacity interdependence analysis (SCIA) using the MICMAC methodology (Cross-impact matrix multiplication applied to classification) to assess the interdependency that exist between the sub-systems categories to deliver services at the system level. The sustainability analysis results based on capacity variables influence and dependency models shows that development activities in the settlement are unstable and, therefore, unsustainable since there is no apparent difference between the influential and dependent data used for the assessment. These results illustrate that an integrated system could improve human settlements’ sustainability and that capacity building in service delivery is beneficial and necessary.展开更多
This paper focuses on the H∞ controller design for linear systems with time-varying delays and norm-bounded parameter perturbations in the system state and control/disturbance. On the existence of delayed/undelayed f...This paper focuses on the H∞ controller design for linear systems with time-varying delays and norm-bounded parameter perturbations in the system state and control/disturbance. On the existence of delayed/undelayed full state feedback controllers, we present a sufficient condition and give a design method in the form of Riccati equation. The controller can not only stabilize the time-delay system, but also make the H∞ norm of the closed-loop system be less than a given bound. This result practically generalizes the related results in current literature.展开更多
This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal syste...This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development.展开更多
In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented ...In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented two approaches for synthesis the proportional-integral-derivative controller to the models of objects with inertia, that offer the procedure of system performance optimization based on maximum stability degree criterion. The proposed algorithms of system performance optimization were elaborated for model of objects with inertia second and third order and offer simple analytical expressions for tuning the PID controller. Validation and verification are conducted through computer simulations using MATLAB, demonstrating successful performance optimization and showcasing the effectiveness PID controllers’ tuning. The proposed approaches contribute insights to the field of control, offering a pathway for optimizing the performance of second and third-order inertial systems through robust controller synthesis.展开更多
The transmission system is a critical power component of helicopters, playing an indispensable role in power transmission. Among its key elements, the planetary gear system is an essential part of the helicopter trans...The transmission system is a critical power component of helicopters, playing an indispensable role in power transmission. Among its key elements, the planetary gear system is an essential part of the helicopter transmission architecture. Establishing a dynamic model of the helicopter transmission system and analyzing the dynamic response of the planetary gear system under varying flight conditions are crucial for enhancing the system’s performance and safety. In this study, the transmission system is modeled comprehensively using the lumped mass method and the finite element method, and the dynamic characteristics of the planetary gear system, as reflected on the main gearbox casing under different flight scenarios, are examined. The findings reveal that the resonance frequencies of the planetary gear system remain consistent across various flight conditions, indicating that these frequencies are governed by the inherent structural and dynamic properties of the system. However, the vibration amplitudes at resonance points differ depending on the flight condition. Specifically, the resonance amplitudes at 0.057 kHz and 0.093 kHz during Hovering are significantly lower than those in other conditions, demonstrating that operational scenarios directly influence vibration response.展开更多
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati...The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.展开更多
There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing env...There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented.展开更多
As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS...As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.展开更多
文摘This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
文摘The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.
文摘Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.
文摘Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
文摘The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.
文摘The article synthesizes and presents the results regarding the stability of positive homogeneous systems that have been researched and published in recent years. Next, we provide a sufficient condition for global exponential stability in the case of discrete-time positive homogeneous systems with an order less than one with time-varying delays.
文摘The challenge of transitioning from temporary humanitarian settlements to more sustainable human settlements is due to a significant increase in the number of forcibly displaced people over recent decades, difficulties in providing social services that meet the required standards, and the prolongation of emergencies. Despite this challenging context, short-term considerations continue to guide their planning and management rather than more integrated, longer-term perspectives, thus preventing viable, sustainable development. Over the years, the design of humanitarian settlements has not been adapted to local contexts and perspectives, nor to the dynamics of urbanization and population growth and data. In addition, the current approach to temporary settlement harms the environment and can strain limited resources. Inefficient land use and ad hoc development models have compounded difficulties and generated new challenges. As a result, living conditions in settlements have deteriorated over the last few decades and continue to pose new challenges. The stakes are such that major shortcomings have emerged along the way, leading to disruption, budget overruns in a context marked by a steady decline in funding. However, some attempts have been made to shift towards more sustainable approaches, but these have mainly focused on vague, sector-oriented themes, failing to consider systematic and integration views. This study is a contribution in addressing these shortcomings by designing a model-driving solution, emphasizing an integrated system conceptualized as a system of systems. This paper proposes a new methodology for designing an integrated and sustainable human settlement model, based on Model-Based Systems Engineering and a Systems Modeling Language to provide valuable insights toward sustainable solutions for displaced populations aligning with the United Nations 2030 agenda for sustainable development.
文摘Zimbabwe has witnessed the evolution of Information Communication Technology (ICT). The vehicle population soared to above 1.2 million hence rendering the Transport and Insurance domains complex. Therefore, there is a need to look at ways that can augment conventional Vehicular Management Information Systems (VMIS) in transforming business processes through Telematics. This paper aims to contextualise the role that telematics can play in transforming the Insurance Ecosystem in Zimbabwe. The main objective was to investigate the integration of Usage-Based Insurance (UBI) with vehicle tracking solutions provided by technology companies like Econet Wireless in Zimbabwe, aiming to align customer billing with individual risk profiles and enhance the synergy between technology and insurance service providers in the motor insurance ecosystem. A triangulation through structured interviews, questionnaires, and literature review, supported by Information Systems Analysis and Design techniques was conducted. The study adopted a case study approach, qualitatively analyzing the complexities of the Telematics insurance ecosystem in Zimbabwe, informed by the TOGAF framework. A case-study approach was applied to derive themes whilst applying within and cross-case analysis. Data was collected using questionnaires, and interviews. The findings of the research clearly show the importance of Telematics in modern-day insurance and the positive relationship between technology and insurance business performance. The study, therefore revealed how UBI can incentivize positive driver behavior, potentially reducing insurance premiums for safe drivers and lowering the incidence of claims against insurance companies. Future work can be done on studying the role of Telematics in combating highway crime and corruption.
文摘Refugee settlements face several challenges in transitioning from a temporary planning approach to more sustainable settlements. This is mainly due to an increase in the number of forcibly displaced people over the last few decades, and the difficulties of sustainably providing social services that meet the required standards. The development of refugee settlements assumed that forcibly displaced people would return to their places or countries of origin. Unfortunately, displacement situations are prolonged indefinitely, forcing these people to spend most of their lives in conditions that are often deplorable and substandard, and therefore unsustainable. In most cases, the establishment of refugee settlements is triggered by an emergency caused by an influx of forcibly displaced people, who need to be accommodated urgently and provided with some form of international assistance and protection. This leaves little or no time for proper planning for long-term development as required. In addition, the current approach to temporary settlement harms the environment and can strain limited resources with ad hoc development models that have exacerbated difficulties. As a result, living conditions in refugee settlements have deteriorated over the last few decades and continue to pose challenges as to how best to design, plan, and sustain settlements over time. To contribute to addressing these challenges, this study proposes a new methodology supported by Model-Based Systems Engineering (MBSE) and a Systems Modeling Language (SysML) to develop a typical sustainable human settlement system model, which has functionally and operationally executed using a Systems Engineering (SE) approach. To assess the sustainability capacity of the proposed system, this work applies a matrix of crossed impact multiplication through a case study by conducting a system capacity interdependence analysis (SCIA) using the MICMAC methodology (Cross-impact matrix multiplication applied to classification) to assess the interdependency that exist between the sub-systems categories to deliver services at the system level. The sustainability analysis results based on capacity variables influence and dependency models shows that development activities in the settlement are unstable and, therefore, unsustainable since there is no apparent difference between the influential and dependent data used for the assessment. These results illustrate that an integrated system could improve human settlements’ sustainability and that capacity building in service delivery is beneficial and necessary.
基金This project was supported by the National Natural Science Foundation of China (No. 69974022).
文摘This paper focuses on the H∞ controller design for linear systems with time-varying delays and norm-bounded parameter perturbations in the system state and control/disturbance. On the existence of delayed/undelayed full state feedback controllers, we present a sufficient condition and give a design method in the form of Riccati equation. The controller can not only stabilize the time-delay system, but also make the H∞ norm of the closed-loop system be less than a given bound. This result practically generalizes the related results in current literature.
文摘This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development.
文摘In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented two approaches for synthesis the proportional-integral-derivative controller to the models of objects with inertia, that offer the procedure of system performance optimization based on maximum stability degree criterion. The proposed algorithms of system performance optimization were elaborated for model of objects with inertia second and third order and offer simple analytical expressions for tuning the PID controller. Validation and verification are conducted through computer simulations using MATLAB, demonstrating successful performance optimization and showcasing the effectiveness PID controllers’ tuning. The proposed approaches contribute insights to the field of control, offering a pathway for optimizing the performance of second and third-order inertial systems through robust controller synthesis.
文摘The transmission system is a critical power component of helicopters, playing an indispensable role in power transmission. Among its key elements, the planetary gear system is an essential part of the helicopter transmission architecture. Establishing a dynamic model of the helicopter transmission system and analyzing the dynamic response of the planetary gear system under varying flight conditions are crucial for enhancing the system’s performance and safety. In this study, the transmission system is modeled comprehensively using the lumped mass method and the finite element method, and the dynamic characteristics of the planetary gear system, as reflected on the main gearbox casing under different flight scenarios, are examined. The findings reveal that the resonance frequencies of the planetary gear system remain consistent across various flight conditions, indicating that these frequencies are governed by the inherent structural and dynamic properties of the system. However, the vibration amplitudes at resonance points differ depending on the flight condition. Specifically, the resonance amplitudes at 0.057 kHz and 0.093 kHz during Hovering are significantly lower than those in other conditions, demonstrating that operational scenarios directly influence vibration response.
文摘The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene.
文摘There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented.
文摘As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges.