With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is... more
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
This paper presents the programming and use of TMS320F2812 digital signal processor (DSP) in generating the digital pulse width modulation (DPWM). The structure and functions of eZdsp 2812 board used in this work is explained briefly and... more
This paper presents the programming and use of TMS320F2812 digital signal processor (DSP) in generating the digital pulse width modulation (DPWM). The structure and functions of eZdsp 2812 board used in this work is explained briefly and the steps need to be taken for the programming is explain in detail to control the frequency, the duty cycle and dead band of the generated PWM. The PWM generated by DSP from programming can be used to control and regulate power electronic converters.
This paper presents the analysis of Fuzzy Logic controller for permanent magnet brushless DC motor drive. The brushless direct current (BLDC) motor is efficiently controlled by Fuzzy logic controller compare to the other type of... more
This paper presents the analysis of Fuzzy Logic controller for permanent magnet brushless DC motor drive. The brushless direct current (BLDC) motor is efficiently controlled by Fuzzy logic controller compare to the other type of controllers. The dynamic characteristics of the brushless dc motor such as speed, torque, currents and voltages of the inverter components are easily observed and analyzed by using the developed Matlab model. To verify the effectiveness of the controller the simulation results are compared with experimental results.
Golden ratio is often denoted by the Greek letter, usually in lower case, Phi (φ) which is an irrational mathematical constant, approximately 1.6180339887. Because of its unique and interesting properties, many mathematicians as well as... more
Golden ratio is often denoted by the Greek letter, usually in lower case, Phi (φ) which is an irrational mathematical constant, approximately 1.6180339887. Because of its unique and interesting properties, many mathematicians as well as renaissance artists and architects studied, documented and employed golden section proportions in remarkable works of sculpture, painting and architecture. Robot sizing especially for the Humanoid Robot, Phi is considered as the key to achieve the human friendly look. The ratio also ...
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is... more
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is... more
With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems.
Frequent robot re-training is required if the robot has to perform variety of tasks. Human Motion is the most natural and fluent form of input to train a robot, and robot motion has always been programmed in an un-natural way. This paper... more
Frequent robot re-training is required if the robot has to perform variety of tasks. Human Motion is the most natural and fluent form of input to train a robot, and robot motion has always been programmed in an un-natural way. This paper presents a method of training of robots by real time emulation of human motion of different limbs. The