Learn More
—This paper addresses the problem of deadbeat control in fully controlled high-power-factor rectifiers. Improved deadbeat control can be achieved through the use of neural-network-based predictors for the input-current reference to the rectifier. In this application, on-line training is absolutely required. In order to achieve sufficiently fast on-line(More)
Probes or network scans are designed to identify security vulnerabilities of a network and are precursor to most of the cyber attacks. Slow, random and distributed attacks are the most difficult to detect. Extensive training over longer packet traces or larger detection window size can give better results but requires larger memory. A model based on Time(More)
Detecting low intensity denial of service (DoS) attacks in minimum time with less false positives is challenging for network based intrusion detection systems. In this paper we propose a new fuzzy logic based approach, which adapts fuzzy linguistic membership functions instead of modifying the fuzzy rules. The authors use the normal TCP profile, i.e. the(More)
Pervasive Computing integrates numerous, casually accessible and inexpensive mobile devices with traditional distributed systems. The foremost issue of pervasive computing is Context-Awareness. Context-Aware Paradigm for Pervasive Computing Environments (CAPP) is a Service Oriented Architecture (SOA) that enhances smart service discovery in a pervasive(More)
Predicting the power output of a Photovoltaic (PV) installation, whether small roof-top or utility scale, is important from resource planning perspective. For a home user, knowledge of solar power availability in the next 12 hours helps in optimal load scheduling. For a utility operator with a mix of power sources, this predicted PV output (along with a(More)
Port scanning is used to identify vulnerable machines, and in most cases a precursor to more sophisticated attacks. Early detection of port scans results in reducing the impact and propagation of distributed attacks and worms. Many algorithmic, threshold and visual based solutions have been proposed each one boils down to testing X events across in Y size(More)
  • 1