Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
numerical simulation
biblio
Acoustical Analysis of Coupled Rooms Applied to the Deutsche Oper Berlin
Submitted by grigby1 on Wed, 01/16/2019 - 1:28pm
ray tracing
FEM
finite element analysis
Iron
mirror source method
numerical simulation
orchestra members
orchestra pit
Position measurement
Deutsche Oper Berlin
Reverberation
room acoustic quantities
sound pressure level
sound propagation
stage performers
Time measurement
wave-based finite element method
acoustical analysis
Human behavior
Resiliency
Scalability
acoustic coupling
acoustic applications
Acoustic measurements
acoustic propagation
acoustic wave propagation
pubcrawl
Acoustics
architectural acoustics
auditorium
BEM
boundary element method
boundary-elements methods
complex rooms
file
An Integrated Simulation and Process Control Platform for Distributed Manufacturing Process Chains
Submitted by kfe760 on Tue, 12/04/2018 - 4:49pm. Contributors:
Kornel Ehmann
Greg Wagner
Jian Cao
Wing Liu
Mojtaba Mozaffar
Directed Energy Deposition (DED)
numerical simulation
Volumetric Representation
Session 5: LT
1646592
CPS-PI Meeting 2018
2018
Presentation
biblio
Dynamic state estimation assisted posturing for generator out-of-step protection
Submitted by el_wehby on Mon, 05/14/2018 - 1:23pm
protective relay
Phasor measurement units
PMU-assisted particle filter
power swing
power system
Power system dynamics
Power system protection
power system state estimation
protection function improvement
phasor measurement unit assisted particle filter
relay protection
Relays
Rotors
step-up transformer voltage-side voltage phase angle
synchronous generator
synchronous generators
synchrophasor
transformer protection
machine protection
DSE-enabled algorithm
Dynamic state estimation
dynamic state estimation assisted posturing
electromechanical state estimation
generator out-of-step protection
Generators
hidden failure
Impedance
10-machine 39 bus test system
Monitoring
numerical simulation
OOS event
out-of-step
particle filtering (numerical methods)
phasor measurement
Phasor Measurement Unit
1549831
biblio
Hidden attractor dynamics of a novel non-equilibrium fractional-order chaotic system and its synchronisation control
Submitted by grigby1 on Wed, 02/21/2018 - 12:45pm
Policy-Governed Secure Collaboration
non-equilibrium
nonequilibrium FOCS
nonequilibrium fractional-order chaotic system
nonlinear control
nonlinear control systems
numerical analysis
numerical simulation
Orbits
phase portraits
Policy
Metrics
pubcrawl
resilience
Resiliency
Scalability
Sensitivity
synchronisation
synchronisation control
Synchronization
Trajectory
fractal Lyapunov dimension
bifurcation analysis
bifurcation parameter
chaos
chaos based cryptology
coding information
collaboration
composability
Cryptography
cryptology
encoding
bifurcation
fractional-order chaotic system
fractional-order hidden strange attractor
hidden attractor
hidden attractor dynamics
Human behavior
human factor
Lyapunov methods
maximum likelihood estimation
maximum Lyapunov exponent spectrum
biblio
Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Resiliency
normalization technique
numerical integration
numerical simulation
numerical solution
probability
pseudo-random number generator
pseudorandom binary sequence generator
pubcrawl
random number generation
Random sequences
normalization factor
Rössler attractors
Rössler system
semi-implicit ODE solver
semiimplicit ODE solvers
semiimplicit symmetric composition D-method
state variables values
statistical testing
Thomas attractor
Thomas attractors
correlation analysis methods
chaotic communication
chaotic cryptography
chaotic differential equations
chaotic ODEs
chaotic pseudorandom number generators
chaotic system
composability
Correlation
Correlation analysis
chaos
differential equations
dynamical chaos
generation process
generator architecture
Generators
Metrics
NIST
NIST statistical test suite
nonlinear control systems
biblio
Mathematical cryptanalysis of \#x201C;personalized information encryption using ECG signals with chaotic functions \#x201D;
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Henon map
text encryption
text analysis
Secret key
Resiliency
pubcrawl
Physics
personalized information encryption
Optics
numerical simulation
Metrics
mathematical cryptanalysis
image data encryption
Heuristic algorithms
Henon mapping
bifurcation
Electrocardiography
electrocardiogram
ECG signals
data encryption algorithm
cryptosystem
Cryptography
cryptanalysis
composability
Chosen-plaintext attack
chaotic system
chaotic functions
chaotic cryptography
chaos
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Mon, 05/04/2015 - 11:04am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Fri, 05/01/2015 - 7:39am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
« first
‹ previous
1
2
3