نتایج جستجو برای: intelligent protection
تعداد نتایج: 254231 فیلتر نتایج به سال:
This paper reviews aspects of unmanned aerial vehicle (UAV) autonomy as suggested by the Autonomous Control Logic chart of the U.S. DoD UAV autonomy roadmap; levels of vehicle autonomy addressed through intelligent control practices and a hierarchical/intelligent control architecture are presented for UAVs. Basic modules of the control hierarchy and their enabling technologies are reviewed; of ...
OVERVIEW: Paralleling the rapid penetration of the Internet and corporate intranets, protection and control system for power systems have been quick to exploit these technologies to make the remote control and monitoring of power systems more convenient. By leveraging these networking technologies to achieve a new level of openness, Hitachi, Ltd. has now succeeded in developing a protection and...
In this paper we describe a network for distributing personalised information with the usage of artificial intelligence methods. Reception of this information should be possible with everyday mobile equipment. Intelligent filtering and spam protection aim at integrating this technology into our environment. Information on the system architecture and usage of the installation are also presented.
In this paper, we survey the state-of-the-art in the development of automated visual surveillance systems and discuss on how this can be applied for the national security. Video surveillance system is the very complex task that needs to combine multiple technologies together. We summarize the progress of this technology in term of sensor and devices, infrastructure, and intelligent technologies...
One of the issues that constrains the use of GMPLS protocol in DWDM links is the slow rerouting provided by GMPLS over DWDM networks.The 1+1 protection mechanism is an approach to solve it, where a backup link is employed as mirror to provide an immediate fault recovery. However, such solution is costly since a given channel must exclusively be allocated. Intelligent agents can execute the task...
There major challenges for current Intrusion Detection Systems (IDS) which attempt to identify suspicious network traffic. Due to the high percentage of alerts generated by such systems, the level of false positives is among the significant problems. We present intelligent strategies for reduction of false positives and infrastructure protection using a novel approach using adaptive responses f...
This paper analyses three quantifiable benefits of Optical Cross Connect (OXC) architectures and how these are affected by network topology and traffic characteristics. The cost-saving benefits of shared protection, the revenue increasing potential of dynamic provisioning, and the efficiency gains of network reconfiguration are analysed. All three of these benefits are available when an OXC-ena...
This paper described the proposed protection route mechanism and simulation of protection mechanism model in order to achieve survivability in PON-FTTH. Due to large transport capacity achieved by the network, failures which occur cause huge losses of data and greatly influence upon a large number of users over a wide area. Therefore, the survivability of the whole network has to be examined mo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید