-
TDSM: Trusted Dissemination Safety Messages in a Multi-hop V2V Communication
Hanaa Sami Basheer,
Carole Bassil,
Bilal Chebaro
Issue:
Volume 4, Issue 2, December 2020
Pages:
16-34
Received:
1 July 2020
Accepted:
17 July 2020
Published:
13 August 2020
Abstract: Broadcasting is a transmission of the same message to multiple recipients to form the communication process between wireless vehicular networks. Yet, many challenges still need to be addressed to ensure proper broadcasting. These include resolving the different security problems that affect the vehicular network efficiency while exchanging messages, and achieving low dissemination overhead and minimum broadcast delay while maintaining high delivery ratio. In this paper, we present a novel model for trusting the safety message before disseminating it, through multi-hop V2V communication. We also, ensured message high delivery rate with minimum time delay. To this end, we recommend the idea of dividing the digital roadmap of the interested area into small fixed size segments. To transmit the packets between vehicles, we depend on pairs of concatenated information composed of the beacon message and the safety message, where the sending time is arranged according to the road density. The model relies on the idea of using a forwarder to rebroadcast the safety message between segments. Choosing the best forwarder is thus based on a calculated weight value for links between the vehicles. Our contribution is achieved by adding two decentralized data trust stages: to entrust the safety message information in one-hop, and before disseminating it farther through multi-hop. The simulation results using NS2 and SUMO showed the effectiveness of the model. The two stages of the trust method are also verified.
Abstract: Broadcasting is a transmission of the same message to multiple recipients to form the communication process between wireless vehicular networks. Yet, many challenges still need to be addressed to ensure proper broadcasting. These include resolving the different security problems that affect the vehicular network efficiency while exchanging messages...
Show More
-
Voltage-Frequency Control (v-f) of Islanded Microgrid Based on Battery and MPPT Control
Masoud Dashtdar,
Majid Dashtdar
Issue:
Volume 4, Issue 2, December 2020
Pages:
35-48
Received:
12 April 2020
Accepted:
24 April 2020
Published:
25 August 2020
Abstract: With the development and increasing influence of the use of distributed generation resources, distribution networks have changed from passive networks to active networks. In these new networks, operation on an island will increase both the reliability of the network in the competitive market and the maximum utilization of distributed generation resources. But despite the various benefits, Microgrids with distributed generation resources also have disadvantages. One of the disadvantages is the increasing complexity of control systems, protection systems and operating systems of the global distribution network. In recent research, various methods have been proposed for controlling the Microgrids, especially voltage and frequency control. This paper presents a method for controlling a photovoltaic (PV) system with maximum power point tracking (MPPT) controller and battery storage to provide voltage-frequency (v-f) support in an islanded microgrid. It introduces a new algorithm for MPPT control that offers control strategies, effective coordinated between v-f control in inverter, MPPT control, and battery storage control. Finally, the proposed scheme is implemented on the IEEE 13-bus distribution feeder in islanded mode using MATLAB software, the results of which clearly demonstrate the efficiency of the control methods.
Abstract: With the development and increasing influence of the use of distributed generation resources, distribution networks have changed from passive networks to active networks. In these new networks, operation on an island will increase both the reliability of the network in the competitive market and the maximum utilization of distributed generation res...
Show More
-
Detection and False Alarm Probabilities over Non-fading and Fading Environment
Abdullah Al Zubaer,
Sabrina Ferdous,
Rohani Amrin,
Md. Romzan Ali,
Md. Alamgir Hossain
Issue:
Volume 4, Issue 2, December 2020
Pages:
49-54
Received:
5 September 2020
Accepted:
19 September 2020
Published:
25 September 2020
Abstract: Cognitive radio which is a low-cost communication system can choose the available frequencies and waveform so that it can restrict the interference on the unlicensed users on the premise automatically. In cognitive radio networks the spectrum sensing is considered as the key technology. On the contrary it is not only able fill voids in the wireless spectrum but also it can increase the spectral efficiency dramatically. The another issue is that sometimes users can experience deep shadowing or fading effect that time accurate detection factor will be compromised. However, we also allow the CK (cognitive Radio) users to co-operate by sharing their information so that it can detect the primary users (PU) to more accurately. Indeed, the main motive of this project is to investigate performance of Co-operative spectrum sensing scheme by upgrade using energy detection and to promote/n the sensing performance in channels such as AWGN and Rayleigh fading channels. At fusion centre (FC) hard decision is performed which is the combination of (OR rule and AND rule). That is why for this extraordinary performance CR (Cognitive Radio) can be able to make final decision about primary user present or not. Additionally, comparisons among data fusion rules have been investigated also for a vast range of average in SNR (Signal to noise ratio) values. As a result, the performance of this CR is evaluated in terms of the probability of miss detection (Pmd) and the probability of false alarm (Pfa). Moreover, the report is compared between the theoretical value and the simulated result and then it describes the relationship between the signal to noise ratio (SNR) and the detections. At last, the method, energy detection and simulation and result are discussed.
Abstract: Cognitive radio which is a low-cost communication system can choose the available frequencies and waveform so that it can restrict the interference on the unlicensed users on the premise automatically. In cognitive radio networks the spectrum sensing is considered as the key technology. On the contrary it is not only able fill voids in the wireless...
Show More
-
Building a Model for Prediction Exchange Rate from USD to VND Using a Novel Method
Nghien Nguyen Ba,
Cuong Nguyen Thai,
Huyen Le Xuan,
Nhung Nguyen Thi,
Phuong Pham Thi Kim,
Thuy Ngo Thi Bich
Issue:
Volume 4, Issue 2, December 2020
Pages:
55-61
Received:
10 September 2020
Accepted:
23 September 2020
Published:
13 October 2020
Abstract: In this paper, the combination of the Hilbert-Huang Transform (HHT), Support Vector Regression (SVR) and an embedding theorem is described to predict the short-term exchange rate from United States dollar to Vietnamese Dong. Firstly, we use Empirical Mode Decomposition (EMD) of the HHT to decompose a signal into multi oscillation scales called Intrinsic Mode Function (IMF). After that, we synthesis the signal without highest oscillation IFM to reduce noise. Next, we use the False nearest neighbors algorithm to find the embedding dimension space of the de-noise signal. Finally, we use SVR to build a model for prediction exchange rate between US dollar and VND. By using the Hilbert-Huang Transform as an adaptive filter, the proposed method decreases the embedding dimension space from twelve (original samples) to four (de-noising samples). This dimension space provides the number of inputs to the SVR model, which affects the complexity and the training time decrease of the model. Experimental results indicated that this method not only reduces complication of the model but also achieves higher accuracy prediction than the direct use of original data.
Abstract: In this paper, the combination of the Hilbert-Huang Transform (HHT), Support Vector Regression (SVR) and an embedding theorem is described to predict the short-term exchange rate from United States dollar to Vietnamese Dong. Firstly, we use Empirical Mode Decomposition (EMD) of the HHT to decompose a signal into multi oscillation scales called Intr...
Show More
-
Design and Implementation of Gsm Enabled Remote Sensor for Monitoring Power Transformer Operation
Idim Aniebiet,
Iyere Sunday Fidelis
Issue:
Volume 4, Issue 2, December 2020
Pages:
62-71
Received:
25 October 2020
Accepted:
7 November 2020
Published:
23 November 2020
Abstract: Transformer is one of the most vital components of power transmission and distribution infrastructure. In a developing country such as Nigeria, majority of the growing population of the people are still grappling with gross inadequate and epileptic power supply. Only about 4000MW of electricity is available for distribution (by load shedding) due to decay in existing infrastructure. The aim of this work is to apply modern technology to prevent further decay of the equipments particularly the transformer which is very expensive. This article involves the design and implementation of a device to monitor and detect the operating condition of a transformer with emphasis on power distribution transformers. A module embedded Global System for Mobile communication (GSM) enabled device is designed to monitor load currents and temperature, using a micro-controller and sensor. The monitored values are processed and recorded in the system memory which is programmed with some predefined instructions to detect any abnormal working condition of the transformer so that the GSM module can send a Small Message Signal (SMS) to designated mobile telephones containing information about the fault, base on the programmed instructions into the micro-controller. This will help the power distribution company respond swiftly to abnormalities that may lead to catastrophic failures and subsequent system short down. It is a fully automated device capable of reducing the risk of transportation and human errors associated with manual transformer inspection and testing. The device was tested and it responded very well to fulfill the set objectives.
Abstract: Transformer is one of the most vital components of power transmission and distribution infrastructure. In a developing country such as Nigeria, majority of the growing population of the people are still grappling with gross inadequate and epileptic power supply. Only about 4000MW of electricity is available for distribution (by load shedding) due t...
Show More
-
Transitory Regimes and Their Effects on the Insulation of High Power Transformers
Marian Duta,
Maria Cristina Nitu,
Marcel Nicola
Issue:
Volume 4, Issue 2, December 2020
Pages:
72-80
Received:
6 November 2020
Accepted:
18 November 2020
Published:
4 December 2020
Abstract: Transformers are the most important pieces of equipment in the electricity transmission and distribution system. Their importance derives both from their high cost and from the fact that they ensure a proper operation of the national power system. The transitory regimes generated during the operation of transformers, such as the overvoltage caused by the lightning impulse and the transient currents when wiring the transformers result in mechanical stress, thermal stress and electrical stress in transformers. These stresses lead to the aging of the insulation system, to avoid possible damage or even the decommissioning of transformers, this paper presents analytical methods for determining the overvoltage transmitted between the windings of transformers due to the lightning impulse and the transient currents that occur when connecting the transformers. The studies were performed on two high power transformers: TTOS-OFAF of 40 MVA, 123 6.3 kV was used to determine the overvoltages that propagate at the windings of the transformer subjected to lightning impulse, and on TTOS-OFAF of 15 MVA, 10.5 / 6.3 kV was performed the study on the effects of the appearance of the connection current on the transformer insulation. The studied phenomena can have a negative impact on the transformer operation.. The results obtained have been validated by laboratory tests, and they can be used to determine the measures to be taken in order to avoid possible damages as of the time of the transformer implementation in the system.
Abstract: Transformers are the most important pieces of equipment in the electricity transmission and distribution system. Their importance derives both from their high cost and from the fact that they ensure a proper operation of the national power system. The transitory regimes generated during the operation of transformers, such as the overvoltage caused ...
Show More
-
Cybersecurity in a Post-Quantum World: How Quantum Computing Will Forever Change the World of Cybersecurity
Marc Nahed,
Shadi Alawneh
Issue:
Volume 4, Issue 2, December 2020
Pages:
81-93
Received:
11 December 2020
Accepted:
18 December 2020
Published:
25 December 2020
Abstract: High Performance Computing (HPC) has recently been considerably improved, for instance quantum computing has been developed to achieve high performance computation in many areas, such as medical research, artificial intelligence, weather forecasting, etc. But it also poses a significant threat to cybersecurity, requiring changes to data encryption methods. Currently, the most widely used asymmetric algorithms are based on difficult mathematical problems, such as factoring large numbers, which can take thousands of years on today’s most powerful supercomputers. The purpose of this paper is to dive into the field of cybersecurity and understand how modern practices will be affected by the advancements of quantum computing. In doing so, a fundamental understanding of modern-day computing, modern-day cybersecurity, and quantum computing will need to be established. This, in turn, will build the foundation to allow for a comprehensive analysis of how powerful quantum-based computing is in comparison to modern-day computing, and how this disruptive technology will ultimately change the field of cybersecurity on a global scale. In addition, current industry cybersecurity best practices will be presented to expose their projected vulnerabilities as well as what can be done in the immediate future to prepare for the ever-rapid advancements in computing. Finally, conclusions will be extrapolated on what is to come for future generations in the ongoing race between computing and cybersecurity.
Abstract: High Performance Computing (HPC) has recently been considerably improved, for instance quantum computing has been developed to achieve high performance computation in many areas, such as medical research, artificial intelligence, weather forecasting, etc. But it also poses a significant threat to cybersecurity, requiring changes to data encryption ...
Show More