The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber a... more The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that offer flexibility and learning capability to software system. This paper presents a quick survey of computing applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the opposite facet – it has become obvious that several cyber security issues may be resolved with success only strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call support is one in all however unresolved issues in cyber security.
The menace of power quality in generation depends on source of energy. Those tendencies are cause... more The menace of power quality in generation depends on source of energy. Those tendencies are caused by different reasons, it include thermal limits, stability limits and the decrease of fossil fuel consumption. The most important issues in national grids are the power quality and supply reliability issues. In this paper, it provides a starting point for utilities in developing countries to better plan their systems to meet dispersed loads, while optimizing for renewables and other decentralized generation sources.
The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber a... more The speed of processes and also the quantity of knowledge to be utilized in defensive the cyber area cannot be handled by humans while not sizeable automation. However, it is troublesome to develop software system with standard mounted algorithms (hard-wired logic on deciding level) for effectively defensive against the dynamically evolving attacks in networks. This example may be handled by applying strategies of computing that offer flexibility and learning capability to software system. This paper presents a quick survey of computing applications in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. Once measuring the papers obtainable regarding AI applications in cyber security, we will conclude that helpful applications exist already. They belong; initial of all, to applications of artificial neural nets in perimeter security and a few alternative cyber security areas. From the opposite facet – it has become obvious that several cyber security issues may be resolved with success only strategies of AI are getting used. For instance, wide information usage is critical in deciding, and intelligent call support is one in all however unresolved issues in cyber security.
The menace of power quality in generation depends on source of energy. Those tendencies are cause... more The menace of power quality in generation depends on source of energy. Those tendencies are caused by different reasons, it include thermal limits, stability limits and the decrease of fossil fuel consumption. The most important issues in national grids are the power quality and supply reliability issues. In this paper, it provides a starting point for utilities in developing countries to better plan their systems to meet dispersed loads, while optimizing for renewables and other decentralized generation sources.
Uploads
Papers by Ayo Isaac