-
Construction and Continuous Processing of Programs with Determinate-Connected Modules
Issue:
Volume 1, Issue 1, June 2017
Pages:
1-8
Received:
29 January 2017
Accepted:
28 February 2017
Published:
15 March 2017
DOI:
10.11648/j.ajece.20170101.11
Downloads:
Views:
Abstract: Continuous processing of large volumes of information on virtual computer memory was considered as technically not realized. This problem is not technical, but algorithmic. In article the solution of this problem is considered: creation of programs with the determinate-connected modules; structure of the supercomputer for continuous processing of programs with the determinate-connected modules; management of the continuous automated processing of programs with the determinate-connected modules on virtual memory without delay of obtaining results because of exchanges of information between random access and external memory. Also block structure of segments of random access memory with anticipatory switching of blocks of random access memory with processors for optimum processing of programs with the determinate-connected modules is considered. The formalism of operator schemes with natural interpretation is developed for reduction of programs with nondeterministic communications of modules to programs with the determined tactics and the strategy of behavior. This formalism is used for the proof of resolvability of a problem of creation of programs with the determinate-connected modules. In the offered theory of operator schemes the problem of creation of programs with determinate appeals to modules is solvable. Continuous processing of programs with the determinate-connected modules on virtual memory of the universal supercomputer with anticipatory management of memory reduces waiting time of result exponential when processing on virtual memory of the target computer in comparison with the existing supercomputers with casual management of memory.
Abstract: Continuous processing of large volumes of information on virtual computer memory was considered as technically not realized. This problem is not technical, but algorithmic. In article the solution of this problem is considered: creation of programs with the determinate-connected modules; structure of the supercomputer for continuous processing of p...
Show More
-
A Multi Agent Scheme and Optimization for Big Data Management of Sensor Networks in Smart City Management
Hui Xie,
Shan Jiao,
Yaqian Wang,
Zhengying Cai
Issue:
Volume 1, Issue 1, June 2017
Pages:
9-17
Received:
15 March 2017
Accepted:
29 March 2017
Published:
15 May 2017
DOI:
10.11648/j.ajece.20170101.12
Downloads:
Views:
Abstract: Because of complex sensor networks in smart city management, it is very difficult to optimize the data processing from all kinds of sensors. Here a multi-agent system (MAS) is made for data processing and optimization of sensor networks in smart city management. First, the sensor network in smart city management is modeled as a self-organized and decentralized agent swarm. In the MAS, each agent’s objective value is reckoned on-line and the best agent’s update rule is on the basis of proportional control concept. Second, each agent is organized by itself to herd to the prime agent in group. And when it avoids the crash between agent and the closest obstruction/agent, it moves to a moving target. Third, to analyze the MAS’s dynamics, the eigenvalue of time-varying discrete system’s analysis is made. Besides, a guideline is put forward for application on how to adjust the parameters of MAS’s. Finally, the results of the simulation verify that the proposed self-organized swarm system is effective in the capability of migration and flocking.
Abstract: Because of complex sensor networks in smart city management, it is very difficult to optimize the data processing from all kinds of sensors. Here a multi-agent system (MAS) is made for data processing and optimization of sensor networks in smart city management. First, the sensor network in smart city management is modeled as a self-organized and d...
Show More
-
Load Curtailment Sensitivity Indices Through Optimal Placement of Unified Power Flow Controller
Issue:
Volume 1, Issue 1, June 2017
Pages:
18-24
Received:
11 March 2017
Accepted:
8 April 2017
Published:
18 May 2017
DOI:
10.11648/j.ajece.20170101.13
Downloads:
Views:
Abstract: The optimal power flow (OPF) is one of the key tasks to be performed in the complicated operation and planning of a power system. Directing the power in such a way that the lightly loaded branches are loaded to reduce the system load curtailment is an option which can be achieved by making use of FACTS devices. This paper proposes a set of load curtailment sensitivity indices for optimal placement of Unified Power Flow Controller (UPFC) in power system network. An OPF formulation considering the minimization of load curtailment requirement as an objective has been developed in this paper to study the impact of optimal placement of UPFC. The effectiveness of the proposed method has been tested on IEEE-14 bus test system. The obtained results have been presented in terms of change in system load curtailment with respect to changes in UPFC controller parameters for the best location. The optimal location of UPFC in a line has been decided based on the calculated sensitivity indices. Conclusion is made on different results to see the benefit of UPFC in power system.
Abstract: The optimal power flow (OPF) is one of the key tasks to be performed in the complicated operation and planning of a power system. Directing the power in such a way that the lightly loaded branches are loaded to reduce the system load curtailment is an option which can be achieved by making use of FACTS devices. This paper proposes a set of load cur...
Show More
-
Design and Construction of an Automatic Home Security System Based on GSM Technology and Embedded Microcontroller Unit
Iyapo Kamoru Olarewaju,
Odo Ekundare Ayodele,
Fasunla Olukayode Michael,
Egbuwalo Shadrack Alaba,
Raimi Oluwole Abiodun
Issue:
Volume 1, Issue 1, June 2017
Pages:
25-32
Received:
16 March 2017
Accepted:
11 April 2017
Published:
18 May 2017
DOI:
10.11648/j.ajece.20170101.14
Downloads:
Views:
Abstract: In wake of the number of burglar incidences rising in different states in Nigeria, and the lack of an efficient state security agency, there has been a focus on the deployment of home security/alarm systems, sponsored by different privately own security outfit in other to combat the high level of crime. With the advancement in technology particularly the Global System Mobile (GSM) technology, securing our home has never been easier. It’s now possible for users to control and monitor systems and development in their household with the help of their smartphones. The development also brings in other advantages like cost effectiveness and much needed efficiency. In this project we design and construct an automatic home security system based on GSM technology and embedded microcontroller unit. The system consisted of an infrared motion detector and a magnetic sensor as transducers for detecting intruders motion or break in through a door. The signals are then processed by an embedded microcontroller unit which then activate the GSM module and send SMS message to the householders mobile phone device, an at the same time activating an attached alarm system. Initial testing of this system shows that it worked as expected.
Abstract: In wake of the number of burglar incidences rising in different states in Nigeria, and the lack of an efficient state security agency, there has been a focus on the deployment of home security/alarm systems, sponsored by different privately own security outfit in other to combat the high level of crime. With the advancement in technology particular...
Show More
-
A Hybrid Honeypot Scheme for Distributed Denial of Service Attack
Hazem Sallowm,
Mohammed Assora,
Mohammed Alchaita,
Mohamad Aljnidi
Issue:
Volume 1, Issue 1, June 2017
Pages:
33-39
Received:
12 March 2017
Accepted:
6 April 2017
Published:
24 May 2017
DOI:
10.11648/j.ajece.20170101.15
Downloads:
Views:
Abstract: The main challenge in network security is keeping up with all threat types that arise every day. Traditional security mechanisms such as firewalls and Intrusion Detection System (IDS) do not provide detection for new attacks or helping in learning new attackers’ techniques. This paper presents a hybrid honeypot scheme that combines low and high interaction honeypots to mitigate the shortcomings of both types. The low interaction honeypots are used to emulate operating systems and services, and for any outbound connection, they act as a proxy to forward the packets to real systems in high interaction honeypot. The scheme is tested by applying Distributed Denial of Service attack (DDOS) against the system, and a significant enhancement to the system security is achieved. The results show that the performance of the IDS has been improved comparing with traditional IDS. Furthermore, the false positive rate is reduced, and the true positive rate is enhanced.
Abstract: The main challenge in network security is keeping up with all threat types that arise every day. Traditional security mechanisms such as firewalls and Intrusion Detection System (IDS) do not provide detection for new attacks or helping in learning new attackers’ techniques. This paper presents a hybrid honeypot scheme that combines low and high int...
Show More
-
Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network
Firas Masoud,
Mohammad Alchaita,
Mohammad Assora
Issue:
Volume 1, Issue 1, June 2017
Pages:
40-49
Received:
11 March 2017
Accepted:
14 April 2017
Published:
26 May 2017
DOI:
10.11648/j.ajece.20170101.16
Downloads:
Views:
Abstract: Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.
Abstract: Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this con...
Show More