Papers by Pavel Gladyshev
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 2021
No permanent magnet on a rotor or coil excitation in the synchronous motor or generator. The roto... more No permanent magnet on a rotor or coil excitation in the synchronous motor or generator. The rotor is a ferromagnetic material block. It moves the magnetic flux created by stator coil excitation placed on a stator around the stator, like rotor with permanent magnet or rotor with coil excitation. For the simulation of the synchronous motor or generator is used Simulink with graphical notation. The Simulink model is simple and visible. The model electrical device consists of two main components: mechanical and electrical. Together, the elements create a device that operates like a control system. Such a representation facilitates analyses and designs of electrical machines. We use a space vector form description of electrical components because the model is correct in transient modes operation. The simulation of the synchronous machine helps design wireless and regular synchronous motors and generators.
Bookmarks Related papers MentionsView impact
2017 23rd International Conference on Virtual System & Multimedia (VSMM), 2017
In recent years, the advances in computer hardware and mobile phones have finally met the demand ... more In recent years, the advances in computer hardware and mobile phones have finally met the demand of high-quality Virtual reality (VR) rendering. This has allowed VR simulator training to be extended into new and exciting fields. One of these new-found areas is Crime scene investigative training for inexperienced police officers. It frees the inexperienced officers from the danger of damaging actual crime scenes during their training. The project aims at creating a technical prototype to prepare for making the current existing desktop based Virtual Crime Scene Simulator work in immersive VR. This demonstration paper reports on the implementation and design of this prototype.
Bookmarks Related papers MentionsView impact
Dagstuhl Reports, 2014
The seminar on Digital Evidence and Forensic Readiness provided the space for interdisciplinary d... more The seminar on Digital Evidence and Forensic Readiness provided the space for interdisciplinary discussions on clearly defined critical aspects of engineering issues, evaluation and processes for secure digital evidence and forensic readiness. A large gap exists between the state-of-the-art in IT security and best-practice procedures for digital evidence. Experts from IT and law used this seminar to develop a common view on what exactly can be considered secure and admissible digital evidence. In addition to sessions with all participants, a separation of participants for discussing was arranged. The outcome of these working sessions was used in the general discussion to work on a common understanding of the topic. The results of the seminar will lead to new technological developments as well as to new legal views to this points and to a change of organizational measures using ICT. Finally, various open issues and research topics have been identified. In addition to this report, ope...
Bookmarks Related papers MentionsView impact
Artificial Intelligence and Law, 2018
Bookmarks Related papers MentionsView impact
Journal of Digital Forensics, Security and Law, 2015
Bookmarks Related papers MentionsView impact
2011 IEEE Power and Energy Society General Meeting, 2011
Abstract The proposed testbed of the cyber‐power system consists of power system simulation, subs... more Abstract The proposed testbed of the cyber‐power system consists of power system simulation, substation automation, and the SCADA system. Scenarios for substation cyber security intrusions and anomaly detection concepts have been proposed. An attack tree ...
Bookmarks Related papers MentionsView impact
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
Bookmarks Related papers MentionsView impact
2011 16th International Conference on Intelligent System Applications to Power Systems, 2011
Bookmarks Related papers MentionsView impact
2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2012
Bookmarks Related papers MentionsView impact
Inconsistencies in various data structures, such as missing log records and modified operating sy... more Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts as indicators of suspicious activity. This paper describes a rigorous methodology for developing such inconsistency checks and verifying their correctness. It is based on the use of the B Method–a formal method of software development. The idea of the methodology is to (1) formulate a state-machine model of the (sub) system in which inconsistencies are ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
IFAC Proceedings Volumes, 2011
Bookmarks Related papers MentionsView impact
IFIP Advances in Information and Communication Technology, 2009
Bookmarks Related papers MentionsView impact
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
Abstract. When encrypted material is discovered during a digital investigation and the investigat... more Abstract. When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then s/he is faced with the problem of how to determine the evidential value of the material. This research is proposing a methodology of extracting probative ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2012
Bookmarks Related papers MentionsView impact
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2014
Bookmarks Related papers MentionsView impact
2011 16th International Conference on Intelligent System Applications to Power Systems, 2011
Bookmarks Related papers MentionsView impact
2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2012
Bookmarks Related papers MentionsView impact
Uploads
Papers by Pavel Gladyshev