Filtry
wszystkich: 4
Wyniki wyszukiwania dla: TDE
-
High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation
PublikacjaThis research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...
-
High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation
PublikacjaThis research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...
-
A ship domain-based model of collision risk for near-miss detection and Collision Alert Systems
PublikacjaThe paper presents a new model of ship collision risk, which utilises a ship domain concept and the related domain-based collision risk parameters. An encounter is here described by five variables representing: degree of domain violation (DDV), relative speed of the two vessels, combination of the vessels’ courses, arena violations and encounter complexity. As for the first three variables, their values can be directly computed...
-
Wybrane metody ochrony danych w systemie RSMAD
PublikacjaW artykule omówiono wybrane metody kryptograficznej ochrony danych zastosowane w Radiowym Systemu Monitorowania i Akwizycji Danych z Urządzeń Fotoradarowych, głównie na poziomie warstw: sieciowej, transportowej, sesji oraz aplikacyjnej tego systemu. Dokonano ponadto identyfikacji potencjalnych zagrożeń oraz przedstawiono wybrane sposoby ochrony przed nimi, jakie zostały zastosowane w tym systemie.