Importance of Practical Relevance and Design Modules in Electrical Circuits education

Author(s):  
Ruba A. Amarin ◽  
Kalpathy B. Sundaram ◽  
Arthur Weeks ◽  
Issa Batarseh
Author(s):  
Ruba Akram Amarin ◽  
Issa Batarseh ◽  
Kalpathy Sundaram ◽  
Arthur Weeks

2021 ◽  
Vol 67 (1 Jan-Feb) ◽  
pp. 91
Author(s):  
N. Sene

This paper revisits Chua's electrical circuit in the context of the Caputo derivative. We introduce the Caputo derivative into the modeling of the electrical circuit. The solutions of the new model are proposed using numerical discretizations. The discretizations use the numerical scheme of the Riemann-Liouville integral. We have determined the equilibrium points and study their local stability. The existence of the chaotic behaviors with the used fractional-order has been characterized by the determination of the maximal Lyapunov exponent value. The variations of the parameters of the model into the Chua's electrical circuit have been quantified using the bifurcation concept. We also propose adaptive controls under which the master and the slave fractional Chua's electrical circuits go in the same way. The graphical representations have supported all the main results of the paper.


Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


Author(s):  
R. A. Morozov ◽  
P. V. Trifonov

Introduction:Practical implementation of a communication system which employs a family of polar codes requires either to store a number of large specifications or to construct the codes by request. The first approach assumes extensive memory consumption, which is inappropriate for many applications, such as those for mobile devices. The second approach can be numerically unstable and hard to implement in low-end hardware. One of the solutions is specifying a family of codes by a sequence of subchannels sorted by reliability. However, this solution makes it impossible to separately optimize each code from the family.Purpose:Developing a method for compact specifications of polar codes and subcodes.Results:A method is proposed for compact specification of polar codes. It can be considered a trade-off between real-time construction and storing full-size specifications in memory. We propose to store compact specifications of polar codes which contain frozen set differences between the original pre-optimized polar codes and the polar codes constructed for a binary erasure channel with some erasure probability. Full-size specification needed for decoding can be restored from a compact one by a low-complexity hardware-friendly procedure. The proposed method can work with either polar codes or polar subcodes, allowing you to reduce the memory consumption by 15–50 times.Practical relevance:The method allows you to use families of individually optimized polar codes in devices with limited storage capacity. 


Sign in / Sign up

Export Citation Format

Share Document