دانلود و نمایش مقالات مرتبط با Black Hole::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Black Hole

تعداد مقالات یافته شده: 10
ردیف عنوان نوع
1 Model predictive energy management in hybrid ferry grids
مدل مدیریت پیش بینی انرژی در شبکه های کشتی ترکیبی-2020
High performance and cost-effective ferry boats are of capital interest for customers and marine industry companies. On the other hand, the traditional ferry boats, operated by diesel generators, spatter the atmosphere with CO2 emissions and detrimental particles. Hence, electric propulsion in marine applications, especially in ferry vessel systems, has gained a lot of attention during the last decade as a promising technology to decrease fuel consumption and emissions. However, one of the main issues in the electric ferries (E-Ferry) is to keep the voltage and frequency within an acceptable range according to the large dynamic load fluctuations. In order to solve this issue, this paper presents a model predictive energy management based on a modified black hole algorithm (BHA) for the hybrid E-Ferry systems. Finally, to study the efficiency of our proposal, we run a real-time simulation using the d-Space simulator and compare the effect of the prediction horizon on the system performance.
Keywords: Marine power system | Model predictive control (MPC) | Electric ferry-system | Fuel cell technology | Black hole algorithm (BHA)
مقاله انگلیسی
2 Lie group analysis, solitons, self-adjointness and conservation laws of the modified Zakharov-Kuznetsov equation in an electron-positron-ion magnetoplasma
تجزیه و تحلیل گروه دروغ ، سولیتون ها ، قوانین خودسنجی و حفاظت از معادله اصلاح شده زاخاروف-کوزنتسف در یک مگنتوپلاسما یونی الکترونی پوزیترون- یون-2020
Electron-positron-ion plasmas are found in the primordial Universe, active galactic nuclei, surroundings of black holes and peripheries of neutron stars. We focus our attention on a modified Zakharov-Kuznetsov (mZK) equation which describes the ion acoustic drift solitary waves in an electron-positron-ion mag- netoplasma. Lie symmetry generators and groups are presented by virtue of the Lie symmetry method. Optimal system of the one-dimensional subalgebras is presented, which is influenced via the ratio of the unperturbed ion density to electron density n io / n eo , the ratio of the unperturbed positron density to electron density n po / n eo , the ratio of the electron temperature to positron temperature T e / T p and the nor- malized ion drift velocity v ∗o . Based on the optimal system, we construct the power-series, multi-soliton, breather-like and periodic-wave solutions. Two types of the elastic interactions, including the overtaking and head-on interactions between (among) two (three) solitons are discussed. We find that the ampli- tudes of the solitons and periodic waves are positively related to the electron Debye length λDe and negatively related to | ρi | with ρi as the ion Larmor radius. Besides, we find that the mZK equation is not only strictly self-adjoint but also nonlinearly self-adjoint. Condition for the nonlinear self-adjointness is related to n io / n eo , n po / n eo , T e / T p and v ∗o . Based on the nonlinear self-adjointness of the mZK equation, conservation laws, which are related to n io / n eo , n po / n eo , T e / T p , v ∗o , λDe , ρi and may be associated with the conservation of momentum and energy, are obtained.
Keywords: Electron-positron-ion magnetoplasma | Modified Zakharov-Kuznetsov equation | Lie group analysis | Solitons | Conservation law
مقاله انگلیسی
3 جلوگیری از حملهBlack Hole در شبکه سنسور بی سیم با استفاده از HMM
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 18
مقاله ترجمه شده
4 A machine learning classifier for microlensing in wide-field surveys
یک طبقه بندی یادگیری ماشین برای میکرونسیلینگ در مرورهای گسترده-2019
While microlensing is very rare, occurring on average once per million stars observed, current and near-future surveys are coming online with the capability of providing photometry of almost the entire visible sky to depths up to R ∼22 mag or fainter every few days, which will contribute to the detection of black holes and exoplanets through follow-up observations of microlensing events. Based on galactic models, we can expect microlensing events across a vastly wider region of the galaxy, although the cadence of these surveys (2-3 d−1) is lower than traditional microlensing surveys, making efficient detection a challenge. Rapid advances are being made in the utility of time-series data to detect and classify transient events in real-time using very high data-rate surveys, but limited work has been published regarding the detection of microlensing events, particularly for when the data streams are of relatively low-cadence. In this research, we explore the utility of a Random Forest algorithm for identifying microlensing signals using time-series data, with the goal of creating an efficient machine learning classifier that can be applied to search for microlensing in wide-field surveys even with lowcadence data. We have applied and optimized our classifier using the OGLE-II microlensing dataset, in addition to testing with PTF/iPTF survey data and the currently operating ZTF, which applies the same data handling infrastructure that is envisioned for the upcoming LSST.
Keywords: Gravitational microlensing | Classification | Random forest | Machine learning | PTF | ZTF
مقاله انگلیسی
5 Dynamic anomaly detection using cross layer security in MANET
تشخیص ناهنجاری پویا با استفاده از لایه امنیتی متقاطع در MANET -2017
Mobile ad hoc networks (MANETs) are one of the emerging technologies of wireless com munication, in which each node in the MANET acts as a router. In an ad hoc network, any node can communicate with any other node in the network. However, this infrastructure of mobile nodes makes this system more vulnerable to various types of attacks. A black hole attack is one such attack in which the packet is dropped maliciously. In this paper, we propose a security solution known as the honeypot-based dynamic anomaly detection using cross-layer security (HBDADCS). The proposed technique detects and isolates black hole attacks from the ad hoc network. In this work, various novel algorithms are used which involve honeypot methodology. These technologies are proposed in order to detect and isolate black hole attacks from the network. Simulation-based results prove that the proposed technique has better packet delivery and end to end to delay with a decreased network load solely due to control packets compared to the other existing techniques.
Keywords: Mobile ad hoc network (MANET) | Ad hoc on demand distance vector (AODV) | protocol | Black Hole attack | Cross layer | Honey pot | Route request (RREQ)
مقاله انگلیسی
6 Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
با استفاده از تجزیه و تحلیل تجزیه و تفکیک برای تشخیص نفوذ در ارتباط خارجی برای وسایل نقلیه خود رانندگی-2017
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on vehicular ad hoc networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection.
Keywords: Secure communication | Vehicle ad hoc networks | IDS | Self-driving vehicles | Linear and quadratic discriminant analysis
مقاله انگلیسی
7 The Z-Wave routing protocol and its security implications
پروتکل مسیریابی Z-Wave و پیامدهای امنیتی آن-2017
Z-Wave is a proprietary technology used to integrate sensors and actuators over RF and perform smart home and office automation services. Lacking implementation details, consumers are under-informed on the security aptitude of their installed distributed sensing and actuating systems. While the Physical (PHY) and Medium Access Control (MAC) layers of the protocol have been made public, details regarding the network layer are not available for analysis. Using a real-world Z-Wave network, the frame forwarding and topology management aspects of the Z-Wave routing protocol are reverse engineered. A security analysis is also performed on the network under study to identify source and data integrity vulnerabilities of the routing pro tocol. It is discovered that the topology and routes may be modified by an outsider through the exploitation of the blind trust inherent to the routing nodes of the network. A Black Hole attack is conducted on a real-world Z-Wave network to demonstrate a well-known routing attack that exploits the exposed vulnerabilities. As a result of the discoveries, several recom mendations are made to enhance the security of the routing protocol.
Keywords: Z-Wave | Network security | Home automation security | Routing protocol analysis | Reverse engineering | Embedded systems security
مقاله انگلیسی
8 Time, terrain and trust: Impacts of rurality on case management in rural Australia
زمان، زمین و اعتماد: اثرات روستایی در مدیریت پرونده روستای استرالیا-2017
There is a ‘black hole’ in our understanding of case management practice with earlier studies identifying this as a particular concern for rural contexts. Using grounded theory methodology, focus groups were conducted with Australian rural case managers to understand how the rural context impacts on the provision of case management services. Findings identified behaviours associated with lengthy rural travel, stemming from a demand for constant output; lack of familiarity with the rural landscape combined with the loss of mobile communication, led to early feelings of trepidation for some women accessing rural spaces; lastly, building inter-agency relationships are critical to successful collaborative work, yet are threatened by lack of trust and frequent turnover of rural programs. Further exploration of these themes, in the international context, would be of benefit.
Keywords: Case management | Rural | Grounded theory | Focus groups
مقاله انگلیسی
9 Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)
تجزیه و تحلیل عملکرد و پیاده سازی مکانیزم پیشنهادی برای شناسایی و پیشگیری از حملات امنیتی در پروتکل های مسیریابی شبکه حمل و نقل هوایی (VANET)-2017
Next-generation communication networks have become widely popular as ad-hoc networks, broadly cat- egorized as the mobile nodes based on mobile ad-hoc networks (MANET) and the vehicular nodes based vehicular ad-hoc networks (VANET). VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad- hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, appli- cability of AODV (Ad hoc On Demand) protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mecha- nism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS) and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.© 2016 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, CairoUniversity. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords:Routing protocol | Mobile ad hoc network (MANET) | Vehicular ad hoc network (VANET) | Black Hole Attack | Malicious node | Throughput
مقاله انگلیسی
10 Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks
مبارزه ساده و همکاری حملات سیاه چاله در شبکه های ادهاک بی سیم چند گامی-2014
In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate nodes to communicate. In order to preserve its limited resources or to launch a DoS attack, an intermediate node drops packets going through it instead to forward them to its successor. In this paper, we deal with this misbehavior called black hole attack, and we propose an authenticated end-to-end acknowledgment based approach in order to check the correct forwarding of packets by intermediate nodes. Our approach detects the black hole conducted in simple or cooperative manner, the modification and the replay of messages attacks. Through simulation using OPNET simulator, we show the detection efficiency and evaluate the performance of our approach in both proactive and reactive routing based networks in terms of end-to-end delay and network load. Also, we compare the approach we propose with 2-hop ACK and the watchdog approaches in terms of detection ratio, delivery ratio and additional overhead. Keywords: Wireless ad hoc network Routing protocol security Simple black hole Cooperative black hole
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6026 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40293 :::::::: افراد آنلاین: 54