Transient Acoustic Signal Detection and Classification

Transient Acoustic Signal Detection and Classification there are many challenges to detection and classication of transient acoustic signals. Due to the reasons stated earlier, there are only a few methods which could work for detecting and classifying man-made...

Ultrasonic Communications in Human Tissues

Ultrasonic Communications in Human Tissues Fundamentals of UltrasoundWaves Ultrasounds are mechanical pressure waves with a frequency above the upper limit of human hearing, i.e., 20 kHz. Ultrasounds consist of mechanical vibrations of particles in a material. Even if...

Introduction To Wireless Medical Implants

Introduction To Wireless Medical Implants Wirelessly networked systems of implantable medical devices endowed with sensors and actuators will be the basis of many innovative, sometimes revolutionary therapies. Artificial pancreases, i.e., implanted continuous glucose...

Detection and Mitigation Strategies

Detection and Mitigation Strategies Intrusion Detection is the primary tool for protecting DNP3 environment from malicious behavior attempting to intercept the network, interrupting communication or manipulating data transmission. There are two types of intrusion...

Multi-Agent Systems

Multi-Agent Systems Basically, an agent is a computer system which can decide to take an action in order to satisfy designed objectives. Agents that must operate robustly in rapidly changing, unpredictable, or open environments, where there is a significant...

Vulnerabilities and Threats – Security Concerns

Vulnerabilities and Threats – Security Concerns A threat is anything that can cause an interruption to network operation or system’s functionalities and can jeopardize its availability. There are different categories of threats including natural threats like floods,...

Critical Infrastructure, Security Policies And Strategies

Critical Infrastructure, Security Policies And Strategies Critical infrastructure is a collection of systems and assets tangible and non-tangible that provides critical services (Fig. 1) to the nation and its protection must be addressed to ensure reliability and...

Motivation Security in Smart Grid

Motivation Security in Smart Grid Security is an essential way to promote safety, protection and data privacy. Security in Critical Infrastructure is about making data availability only to authorized and authenticated users and ensuring reliability of system’s...

Rotary optical encoders

Rotary optical encoders optical encoders Encoder is defined as an electromechanical device that measures motion or position. Encoders typically use optical sensors to generate electrical pulse train signals which are converted to position, motion, or direction ....

Measurement Devices

Voltage and Current Sensors The bus connectors are connected to the voltage and current sensors which are designed for measuring all currents and voltages in the power grid. The voltage and current sensors are electronic transducers which are installed on the designed...

Cascading Failures

Cascading Failures Introduction The complex structure and wide interconnections of power grids make them vulnerable to disturbances such as faults, loss of transmission lines (TLs), etc. This complexity makes the control strategies more sophisticated and costly in...

Common Spike Detection Methods

Common Spike Detection Methods 1. Precision Timing Spike Detection (PT) : PT employs a differential threshold, pulse lifetime period, and refractory period to detect spikes. It searches for a peak within the set PLP after a peak of opposite polarity is found. Provided...