Generator monitoring system based on fuz zy logic
Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.
Подобные документы
The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
??????, добавлен 30.04.2018??????? ???????? ?????? – ??????? ?????? ? ???? ????????. ?????? ?????????? Real Time Bidding, ???????????? ??????? ? "?????????" ????????? ??????. ????????????? ???????????? ?????????? ???????? Sophos ? ????????????? ????????? ??????????? ??????????.
???????????, добавлен 12.01.2017Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.
??????, добавлен 20.01.2017Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
?????, добавлен 08.03.2014The concept and structure, as well as the laws of functioning of the Unified Modeling Language, history of its development. Precedents and conditions of effective use case diagrams. Research of a example of computer simulation and evaluation of results.
???????????, добавлен 05.04.2016???????????? ???????????? ????????? ??????? ???????? ? ???????? ???????? ????? ??????? Time ? ?????? ???????? ????????? ???-???????. ??????????? ? ?????????????? ????????? ??????????, ????????? ??????? ? ???????????? ???????? ????????? ?????????.
??????, добавлен 04.03.2023??????? ?????????????? ??????? ??????????? ???????. ?????????? ?????????? ???????? ?????????? "Logic". ???????? ???????????? ????????? ? ????????? ?? ??????????. ???????????? ??????????. ???????? ??????? ??????????, ???????????? ????? ??? ??????.
??????, добавлен 28.02.2019The data collection algorithm to systematically track gender equality metrics across universities. The advantages of leveraging advanced scraping and analysis techniques to gather nuanced insights from diverse online data sources like university websites.
??????, добавлен 12.12.2024The search for patterns that are the basis for making effective managerial and technological decisions. Application of innovative technologies for the preparation, processing, analysis and analytics of extremely large arrays of heterogeneous data.
??????, добавлен 24.06.2024A concept of a decision support system (DSS) for modeling and forecasting of economic and financial processes is proposed as well as its software implementation. The main functions of the DSS are in modeling of nonstationary nonlinear time series.
??????, добавлен 29.07.2016Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
??????, добавлен 23.09.2018Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021???????????? ???????????? ?????? ????????? MS Project ?? ??????? ??????????? ???????????? ????. ??????????? ????????? ?????. ?????? ?????? PERT (Program Evaluation and Review Technique) ??????? ????? ?????????? ????????? ?? ????????? ?????????????.
??????, добавлен 19.12.2017- 114. ???????? ????????? real-time ???????? ?? ???? ??????????? ?????????? channels ?? ?????????? Django
??????????? ???????? ?????????? ???????? web-????????. ?????? ? ????????????? ??????? ???????????? ??????????? ?????????? Channels ??? ?????? ???????????? ??? ????????? ????????????? ????????. ????? ?? ?????? ?????????? ?? ??????????? ????????????.
??????, добавлен 09.10.2018 Exploring a new open source version of the ReaderBench platform. Calculation of indexes of complexity of texts of various levels according to the Common European scale. Evaluation of the complexity of the perception of the text in various fields.
??????, добавлен 16.08.2023The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
??????, добавлен 15.09.2012The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
??????, добавлен 11.07.2022Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024????? ?????????? ??????, ?????????? ?? ???????? ?????????? ??????. ????? Fuzzy Logic Toolbox ? ??????? ?? MATLAB ??? ???? ?? ???????? ???????????????? ????????????, ???????????? ??? ?????????????? ???????? ??????. ??????? ? ????? ?????????? ?????????.
??????, добавлен 26.07.2018- 120. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Proposing to use complex methods to improve the efficiency of solving linear programming problems using large-scale classical approaches and technologies parallel processing CUDA. Specificity of program and algorithmic features use of the technology.
??????, добавлен 26.09.2016 Application an extension of the well-known Abadi-Rogaway logic with hashes. Description extends Micciancio and Warinschi's completeness result for the original logic to this setting, interpretation of this extension using Canetti's oracle hashing.
??????, добавлен 15.09.2012Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
??????? ??????, добавлен 15.09.2012Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.
??????, добавлен 14.01.2017The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
???????, добавлен 20.03.2016Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, O?net, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
??????, добавлен 25.12.2016