This paper is to develop data collection mechanisms in multi-hop IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) networks. While scheduling, transmission link selection is considered based on the limitations of tra...
详细信息
ISBN:
(纸本)9781467398046
This paper is to develop data collection mechanisms in multi-hop IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) networks. While scheduling, transmission link selection is considered based on the limitations of transmission conflict and transmission interference in ZigBee network topologies. Three scheduling algorithms for data collection are proposed. Furthermore, experiments are made for evaluating the performance of the proposed data scheduling mechanisms for multi-hop IEEE 802.15.4e TSCH networks.
Port Scanning is one of the widely used attacks to collect information of devices connected to the Internet. The information may be very useful for system administrator to assure security, but can be a bridge for mali...
详细信息
ISBN:
(纸本)9781509013265
Port Scanning is one of the widely used attacks to collect information of devices connected to the Internet. The information may be very useful for system administrator to assure security, but can be a bridge for malicious users not only to find vulnerabilities of the devices, but also to consider subsequent attacks. There are several search engines, such as Shodan and Censys, to build and provide searchable databases of identified devices and networks. In this paper, we implement possible stealth port scan attack tools using ZMap used in Censys search engine, and test the vulnerability of devices in an area of our university using the implemented tools. It is shown that though stealth port scanning attacks except SYN scan have been generally known as they are ineffective, many vulnerable systems are still on services and able to be scanned by the attacks.
Feature Extraction(FE) based on Principal Component Analysis(PCA) can effectively improve classification results by reducing the interference among features. However, such a good method has not been employed in previo...
详细信息
ISBN:
(纸本)9781467395922
Feature Extraction(FE) based on Principal Component Analysis(PCA) can effectively improve classification results by reducing the interference among features. However, such a good method has not been employed in previous studies of Incremental Attribute Learning(IAL), a novel machine learning strategy, where features are gradually trained one by one in order to remove interference among features and improve classification results. This study proposed a preprocessing for neural IAL algorithm based on feature extraction with PCA. Experimental results show that this approach is not only very efficient, but also applicable for pattern classification performance improvement.
Soft errors due to Single Event Transients (SETs) have become one of the most challenging issues that impact the reliability of modern microelectronic systems at terrestrial altitudes. This is mainly due to the progre...
详细信息
ISBN:
(纸本)9781479953424
Soft errors due to Single Event Transients (SETs) have become one of the most challenging issues that impact the reliability of modern microelectronic systems at terrestrial altitudes. This is mainly due to the progressive shrinking of device sizes. Traditionally, the analysis of SETs has been carried out by simulations and experimental analysis. However, these techniques are resource hungry and require full details of the design structure and SET characteristics. This paper develops a hierarchical framework for formal analysis of SET propagation by (1) introducing Register Transfer Level (RTL) abstraction and modeling approaches of the underlying behavior of SET propagation using Multiway Decision Graphs (MDGs);and (2) investigating SET propagation conditions at RTL using a formal model checker. In order to illustrate the practical utilization of our work, e have analyzed different RTL combinational designs. Experimental results demonstrate the proposed framework is orders of magnitude faster than other comparable contemporary techniques. Moreover, for the first time, a decision graph based technique s developed to analyze multiplier designs.
The European Climate Change Program consists of a range of measures to fight against climate change, one of which is to reach 20% of renewable energy in the total energy supply in the EU by 2020. The increasing penetr...
详细信息
The European Climate Change Program consists of a range of measures to fight against climate change, one of which is to reach 20% of renewable energy in the total energy supply in the EU by 2020. The increasing penetration of RES and DG introduces new business cases which require innovative ICT tools and the support of appropriate communication infrastructure. This paper focuses on the Virtual Power Plant and Demand Response cases, proposing a general architecture, as well as analyzing core functionalities, information and communication requirements, along with relative standards and technologies. The architectural analysis is based on the SGAM framework, a standardized architecture for smart grid solutions and services that enables new actors in the smart grid domain to participate in the energy markets and contribute to an optimal grid operation. The document presents the use cases' modeling and gives an overview of the pilots in which the proposed models will be materialized and validated.
Battery/cell has some important parameters which make it unique to operate. PKL Electricity Cell is a voltaic/quasi galvanic cell, which has also some important parameters to make it unique from traditional cell/batte...
详细信息
Battery/cell has some important parameters which make it unique to operate. PKL Electricity Cell is a voltaic/quasi galvanic cell, which has also some important parameters to make it unique from traditional cell/battery. In this paper, some important parameters e.g., Discharge rates, Pulse performance etc. of PKL Electricity Cell are analysed in experimentally. Since resources of hydrocarbon of Bangladesh are limited, it's better to think about the significant availability of Renewable energy based development. PKL Electricity Cell is a new form of Biomass energy. Biomass energy is the next potential technology of power generation of the third world countries like Bangladesh. Electricity generation from Biomass energy can be used to electrify the off-grid region of Bangladesh. The objective of this paper as follows: Introduce a new form of Biomass energy, Inspect some important parameters of PKL Electricity Cell which have significant impact for generating Electricity and experimental results are shown the impact of PKL Electricity Cell's parameters.
Human computer Interactivity plays a vital role in a web application's success. A survey evaluation was undertaken of a web application prototype named "My Portfolio", directed towards the students of di...
详细信息
We demonstrate a die level release process for silicon photonic MEMS structures, that is compatible with dies from a standard silicon photonics foundry process which are only several square millimeters in size.
We demonstrate a die level release process for silicon photonic MEMS structures, that is compatible with dies from a standard silicon photonics foundry process which are only several square millimeters in size.
In a Delay Tolerant Network (DTN), nodes are intermittently connected. In order to deliver message from one node to another, message is copied and forwarded to another node when the connection between the nodes is est...
详细信息
ISBN:
(纸本)9781509025985
In a Delay Tolerant Network (DTN), nodes are intermittently connected. In order to deliver message from one node to another, message is copied and forwarded to another node when the connection between the nodes is established. The node that receives the message stores it and forwards the copy of it to another node it encounters. The process is repeated until the destination node is encountered or message life time expires. PRoPHET (Probabilistic Routing Protocol Using History of Encounters and Transitivity) is one of the major DTN routing protocols. However, PRoPHET does not consider energy consumption of nodes. Energy consumption of mobile wireless devices has been a major issue recently as the devices are ubiquitously used. In this paper, we propose an Enhanced PRoPHET routing protocol that considers energy of nodes. We extensively simulated our proposal and have shown that our proposed protocol performs better than the original PRoPHET routing protocol in terms of energy consumption, message delivery probability and overhead ratio.
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect i...
详细信息
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating the availability of the system based on the security level and achieved availability coefficient (depending on MTBF and MTR) is developed and described. The results of the fuzzy inference system (FIS) are presented in the last section of the paper.
暂无评论