با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Model predictive energy management in hybrid ferry grids
مدل مدیریت پیش بینی انرژی در شبکه های کشتی ترکیبی-2020 High performance and cost-effective ferry boats are of capital interest for customers and marine industry companies. On
the other hand, the traditional ferry boats, operated by diesel generators, spatter the atmosphere with CO2 emissions and
detrimental particles. Hence, electric propulsion in marine applications, especially in ferry vessel systems, has gained a lot of
attention during the last decade as a promising technology to decrease fuel consumption and emissions. However, one of the
main issues in the electric ferries (E-Ferry) is to keep the voltage and frequency within an acceptable range according to the
large dynamic load fluctuations. In order to solve this issue, this paper presents a model predictive energy management based
on a modified black hole algorithm (BHA) for the hybrid E-Ferry systems. Finally, to study the efficiency of our proposal,
we run a real-time simulation using the d-Space simulator and compare the effect of the prediction horizon on the system
performance. Keywords: Marine power system | Model predictive control (MPC) | Electric ferry-system | Fuel cell technology | Black hole algorithm (BHA) |
مقاله انگلیسی |
2 |
Lie group analysis, solitons, self-adjointness and conservation laws of the modified Zakharov-Kuznetsov equation in an electron-positron-ion magnetoplasma
تجزیه و تحلیل گروه دروغ ، سولیتون ها ، قوانین خودسنجی و حفاظت از معادله اصلاح شده زاخاروف-کوزنتسف در یک مگنتوپلاسما یونی الکترونی پوزیترون- یون-2020 Electron-positron-ion plasmas are found in the primordial Universe, active galactic nuclei, surroundings of black holes and peripheries of neutron stars. We focus our attention on a modified Zakharov-Kuznetsov (mZK) equation which describes the ion acoustic drift solitary waves in an electron-positron-ion mag- netoplasma. Lie symmetry generators and groups are presented by virtue of the Lie symmetry method. Optimal system of the one-dimensional subalgebras is presented, which is influenced via the ratio of the unperturbed ion density to electron density n io / n eo , the ratio of the unperturbed positron density to electron density n po / n eo , the ratio of the electron temperature to positron temperature T e / T p and the nor- malized ion drift velocity v ∗o . Based on the optimal system, we construct the power-series, multi-soliton, breather-like and periodic-wave solutions. Two types of the elastic interactions, including the overtaking and head-on interactions between (among) two (three) solitons are discussed. We find that the ampli- tudes of the solitons and periodic waves are positively related to the electron Debye length λDe and negatively related to | ρi | with ρi as the ion Larmor radius. Besides, we find that the mZK equation is not only strictly self-adjoint but also nonlinearly self-adjoint. Condition for the nonlinear self-adjointness is related to n io / n eo , n po / n eo , T e / T p and v ∗o . Based on the nonlinear self-adjointness of the mZK equation, conservation laws, which are related to n io / n eo , n po / n eo , T e / T p , v ∗o , λDe , ρi and may be associated with the conservation of momentum and energy, are obtained. Keywords: Electron-positron-ion magnetoplasma | Modified Zakharov-Kuznetsov equation | Lie group analysis | Solitons | Conservation law |
مقاله انگلیسی |
3 |
جلوگیری از حملهBlack Hole در شبکه سنسور بی سیم با استفاده از HMM
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 18 |
مقاله ترجمه شده |
4 |
A machine learning classifier for microlensing in wide-field surveys
یک طبقه بندی یادگیری ماشین برای میکرونسیلینگ در مرورهای گسترده-2019 While microlensing is very rare, occurring on average once per million stars observed, current and
near-future surveys are coming online with the capability of providing photometry of almost the entire
visible sky to depths up to R ∼22 mag or fainter every few days, which will contribute to the detection
of black holes and exoplanets through follow-up observations of microlensing events. Based on galactic
models, we can expect microlensing events across a vastly wider region of the galaxy, although the
cadence of these surveys (2-3 d−1) is lower than traditional microlensing surveys, making efficient
detection a challenge. Rapid advances are being made in the utility of time-series data to detect and
classify transient events in real-time using very high data-rate surveys, but limited work has been
published regarding the detection of microlensing events, particularly for when the data streams are
of relatively low-cadence. In this research, we explore the utility of a Random Forest algorithm for
identifying microlensing signals using time-series data, with the goal of creating an efficient machine
learning classifier that can be applied to search for microlensing in wide-field surveys even with lowcadence
data. We have applied and optimized our classifier using the OGLE-II microlensing dataset, in
addition to testing with PTF/iPTF survey data and the currently operating ZTF, which applies the same
data handling infrastructure that is envisioned for the upcoming LSST. Keywords: Gravitational microlensing | Classification | Random forest | Machine learning | PTF | ZTF |
مقاله انگلیسی |
5 |
Dynamic anomaly detection using cross layer security in MANET
تشخیص ناهنجاری پویا با استفاده از لایه امنیتی متقاطع در MANET -2017 Mobile ad hoc networks (MANETs) are one of the emerging technologies of wireless com
munication, in which each node in the MANET acts as a router. In an ad hoc network, any
node can communicate with any other node in the network. However, this infrastructure
of mobile nodes makes this system more vulnerable to various types of attacks. A black
hole attack is one such attack in which the packet is dropped maliciously. In this paper,
we propose a security solution known as the honeypot-based dynamic anomaly detection
using cross-layer security (HBDADCS). The proposed technique detects and isolates black
hole attacks from the ad hoc network. In this work, various novel algorithms are used
which involve honeypot methodology. These technologies are proposed in order to detect
and isolate black hole attacks from the network. Simulation-based results prove that the
proposed technique has better packet delivery and end to end to delay with a decreased
network load solely due to control packets compared to the other existing techniques.
Keywords: Mobile ad hoc network (MANET) | Ad hoc on demand distance vector (AODV) | protocol | Black Hole attack | Cross layer | Honey pot | Route request (RREQ) |
مقاله انگلیسی |
6 |
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
با استفاده از تجزیه و تحلیل تجزیه و تفکیک برای تشخیص نفوذ در ارتباط خارجی برای وسایل نقلیه خود رانندگی-2017 Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc
networks is crucial to the reliable exchange of information and control data. In this paper, we propose an
intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi
self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on
vehicular ad hoc networks (VANETs). The advantage of the proposed IDS over existing security systems is that it
detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear
Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which are used to predict attacks
based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that
the IDS achieves a low rate of false alarms and high accuracy in detection.
Keywords: Secure communication | Vehicle ad hoc networks | IDS | Self-driving vehicles | Linear and quadratic discriminant analysis |
مقاله انگلیسی |
7 |
The Z-Wave routing protocol and its security implications
پروتکل مسیریابی Z-Wave و پیامدهای امنیتی آن-2017 Z-Wave is a proprietary technology used to integrate sensors and actuators over RF and perform
smart home and office automation services. Lacking implementation details, consumers are
under-informed on the security aptitude of their installed distributed sensing and actuating
systems. While the Physical (PHY) and Medium Access Control (MAC) layers of the protocol
have been made public, details regarding the network layer are not available for analysis. Using
a real-world Z-Wave network, the frame forwarding and topology management aspects of the
Z-Wave routing protocol are reverse engineered. A security analysis is also performed on the
network under study to identify source and data integrity vulnerabilities of the routing pro
tocol. It is discovered that the topology and routes may be modified by an outsider through
the exploitation of the blind trust inherent to the routing nodes of the network. A Black Hole
attack is conducted on a real-world Z-Wave network to demonstrate a well-known routing
attack that exploits the exposed vulnerabilities. As a result of the discoveries, several recom
mendations are made to enhance the security of the routing protocol.
Keywords: Z-Wave | Network security | Home automation security | Routing protocol analysis | Reverse engineering | Embedded systems security |
مقاله انگلیسی |
8 |
Time, terrain and trust: Impacts of rurality on case management in rural Australia
زمان، زمین و اعتماد: اثرات روستایی در مدیریت پرونده روستای استرالیا-2017 There is a ‘black hole’ in our understanding of case management practice with earlier studies identifying
this as a particular concern for rural contexts. Using grounded theory methodology, focus groups were
conducted with Australian rural case managers to understand how the rural context impacts on the
provision of case management services. Findings identified behaviours associated with lengthy rural
travel, stemming from a demand for constant output; lack of familiarity with the rural landscape
combined with the loss of mobile communication, led to early feelings of trepidation for some women
accessing rural spaces; lastly, building inter-agency relationships are critical to successful collaborative
work, yet are threatened by lack of trust and frequent turnover of rural programs. Further exploration of
these themes, in the international context, would be of benefit.
Keywords: Case management | Rural | Grounded theory | Focus groups |
مقاله انگلیسی |
9 |
Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET)
تجزیه و تحلیل عملکرد و پیاده سازی مکانیزم پیشنهادی برای شناسایی و پیشگیری از حملات امنیتی در پروتکل های مسیریابی شبکه حمل و نقل هوایی (VANET)-2017 Next-generation communication networks have become widely popular as ad-hoc networks, broadly cat- egorized as the mobile nodes based on mobile ad-hoc networks (MANET) and the vehicular nodes based vehicular ad-hoc networks (VANET). VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad- hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, appli- cability of AODV (Ad hoc On Demand) protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mecha- nism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS) and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.© 2016 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, CairoUniversity. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Keywords:Routing protocol | Mobile ad hoc network (MANET) | Vehicular ad hoc network (VANET) | Black Hole Attack | Malicious node | Throughput |
مقاله انگلیسی |
10 |
Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks
مبارزه ساده و همکاری حملات سیاه چاله در شبکه های ادهاک بی سیم چند گامی-2014 In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate
nodes to communicate. In order to preserve its limited resources or to launch a DoS attack,
an intermediate node drops packets going through it instead to forward them to its successor. In this paper, we deal with this misbehavior called black hole attack, and we propose
an authenticated end-to-end acknowledgment based approach in order to check the
correct forwarding of packets by intermediate nodes. Our approach detects the black hole
conducted in simple or cooperative manner, the modification and the replay of messages
attacks. Through simulation using OPNET simulator, we show the detection efficiency
and evaluate the performance of our approach in both proactive and reactive routing based
networks in terms of end-to-end delay and network load. Also, we compare the approach
we propose with 2-hop ACK and the watchdog approaches in terms of detection ratio,
delivery ratio and additional overhead.
Keywords:
Wireless ad hoc network
Routing protocol security
Simple black hole
Cooperative black hole |
مقاله انگلیسی |