62 research outputs found

    Towards green energy for smart cities: particle swarm optimization based MPPT approach

    Get PDF
    This paper proposes an improved one-power-point (OPP) maximum power point tracking (MPPT) algorithm for wind energy conversion system (WECS) to overcome the problems of the conventional OPP MPPT algorithm, namely, the difficulty in getting a precise value of the optimum coefficient, requiring pre-knowledge of system parameters, and non-uniqueness of the optimum curve. The solution is based on combining the particle swarm optimization (PSO) and optimum-relation-based (ORB) MPPT algorithms. The PSO MPPT algorithm is used to search for the optimum coefficient. Once the optimum coefficient is obtained, the proposed algorithm switches to the ORB MPPT mode of operation. The proposed algorithm neither requires knowledge of system parameters nor mechanical sensors. In addition, it improves the efficiency of the WECS. The proposed algorithm is studied for two different wind speed profiles, and its tracking performance is compared with conventional optimum torque control (OTC) and conventional ORB MPPT algorithms under identical conditions. The improved performance of the algorithm in terms of tracking efficiency is validated through simulation using MATLAB/Simulink. The simulation results confirm that the proposed algorithm has a better performance in terms of tracking efficiency and energy extracted. The tracking efficiency of the PSO-ORB MPPT algorithm could reach up to 99.4% with 1.9% more harvested electrical energy than the conventional OTC and ORB MPPT algorithms. Experiments have been carried out to demonstrate the validity of the proposed MPPT algorithm. The experimental results compare well with system simulation results, and the proposed algorithm performs well, as expected

    Nearmesh: network environment aware routing in a wireless mesh network for emergency-response

    Get PDF
    Wireless Mesh Networks (WMNs) employ hybrid distributed mobile networks with instant deployment and capabilities Such as: self_healing, self_organization and self_configuration. These abilities make WMNs a likely technology for incident communication. An Incident Area Network (IAN) requires a reliable and efficient routing path in an environment, where infrastructure-based communications have been destroyed. Routing awareness plays a significant part in this situation to deliver dynamic disaster facilities. Though, most of the proposed aware routing schemes do not entirely exploit the characteristics of WMNs. In this article, we propose a network environment-aware routing scheme for emergency response (NEARMesh) in WMNs, which employs a network routing information map to select the optimized path, based on cooperative consideration of route awareness information. This scheme is carried out and verified in NCTNus simulator. Imitation outcomes clearly display that the suggested scheme can enhance the network performance by maintaining a high delivery ratio with low latency while reducing the energy ingesting by minimizing network expenses

    Millimeter wave propagation measurements and characteristics for 5G system

    Get PDF
    In future 5G systems, the millimeter wave (mmWave) band will be used to support a large capacity for current mobile broadband. Therefore, the radio access technology (RAT) should be made available for 5G devices to help in distinct situations, for example device-to-device communications (D2D) and multi-hops. This paper presents ultra-wideband channel measurements for millimeter wave bands at 19, 28, and 38 GHz. We used an ultra-wideband channel sounder (1 GHz bandwidth) in an indoor to outdoor (I2O) environment for non-line-of-sight (NLOS) scenarios. In an NLOS environment, there is no direct path (line of sight), and all of the contributed paths are received from different physical objects by refection propagation phenomena. Hence, in this work, a directional horn antenna (high gain) was used at the transmitter, while an omnidirectional antenna was used at the receiver to collect the radio signals from all directions. The path loss and temporal dispersion were examined based on the acquired measurement data—the 5G propagation characteristics. Two different path loss models were used, namely close-in (CI) free space reference distance and alpha-beta-gamma (ABG) models. The time dispersion parameters were provided based on a mean excess delay, a root mean square (RMS) delay spread, and a maximum excess delay. The path loss exponent for this NLOS specific environment was found to be low for all of the proposed frequencies, and the RMS delay spread values were less than 30 ns for all of the measured frequencies, and the average RMS delay spread values were 19.2, 19.3, and 20.3 ns for 19, 28, and 38 GHz frequencies, respectively. Moreover, the mean excess delay values were found also at 26.1, 25.8, and 27.3 ns for 19, 28, and 38 GHz frequencies, respectively. The propagation signal through the NLOS channel at 19, 28, and 38 GHz was strong with a low delay; it is concluded that these bands are reliable for 5G systems in short-range applications

    A pseudo feedback-based annotated TF-IDF technique for dynamic crypto-ransomware pre-encryption boundary delineation and features extraction

    Get PDF
    The cryptography employed against user files makes the effect of crypto-ransomware attacks irreversible even after detection and removal. Thus, detecting such attacks early, i.e. during pre-encryption phase before the encryption takes place is necessary. Existing crypto-ransomware early detection solutions use a fixed time-based thresholding approach to determine the pre-encryption phase boundaries. However, the fixed time thresholding approach implies that all samples start the encryption at the same time. Such assumption does not necessarily hold for all samples as the time for the main sabotage to start varies among different crypto-ransomware families due to the obfuscation techniques employed by the malware to change its attack strategies and evade detection, which generates different attack behaviors. Additionally, the lack of sufficient data at the early phases of the attack adversely affects the ability of feature extraction techniques in early detection models to perceive the characteristics of the attacks, which, consequently, decreases the detection accuracy. Therefore, this paper proposes a Dynamic Pre-encryption Boundary Delineation and Feature Extraction (DPBD-FE) scheme that determines the boundary of the pre-encryption phase, from which the features are extracted and selected more accurately. Unlike the fixed thresholding employed by the extant works, DPBD-FE tracks the pre-encryption phase for each instance individually based on the first occurrence of any cryptography-related APIs. Then, an annotated Term Frequency-Inverse Document Frequency (aTF-IDF) technique was utilized to extract the features from runtime data generated during the pre-encryption phase of crypto-ransomware attacks. The aTF-IDF overcomes the challenge of insufficient attack patterns during the early phases of the attack lifecycle. The experimental evaluation shows that DPBD-FE was able to determine the pre-encryption boundaries and extract the features related to this phase more accurately compared to related works

    Survey of millimeter-wave propagation measurements and models in indoor environments

    Get PDF
    The millimeter-wave (mmWave) is expected to deliver a huge bandwidth to address the future demands for higher data rate transmissions. However, one of the major challenges in the mmWave band is the increase in signal loss as the operating frequency increases. This has attracted several research interests both from academia and the industry for indoor and outdoor mmWave operations. This paper focuses on the works that have been carried out in the study of the mmWave channel measurement in indoor environments. A survey of the measurement techniques, prominent path loss models, analysis of path loss and delay spread for mmWave in different indoor environments is presented. This covers the mmWave frequencies from 28 GHz to 100 GHz that have been considered in the last two decades. In addition, the possible future trends for the mmWave indoor propagation studies and measurements have been discussed. These include the critical indoor environment, the roles of artificial intelligence, channel characterization for indoor devices, reconfigurable intelligent surfaces, and mmWave for 6G systems. This survey can help engineers and researchers to plan, design, and optimize reliable 5G wireless indoor networks. It will also motivate the researchers and engineering communities towards finding a better outcome in the future trends of the mmWave indoor wireless network for 6G systems and beyond

    Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network

    Get PDF
    Vehicular Ad Hoc Networks (VANETs) have emerged mainly to improve road safety and traffic efficiency and provide user comfort. The performance of such networks’ applications relies on the availability of accurate and recent mobility-information shared among vehicles. This means that misbehaving vehicles that share false mobility information can lead to catastrophic losses of life and property. However, the current solutions proposed to detect misbehaving vehicles are not able to cope with the dynamic vehicular context and the diverse cyber-threats, leading to a decrease in detection accuracy and an increase in false alarms. This paper addresses these issues by proposing a Hybrid and Multifaceted Context-aware Misbehavior Detection model (HCA-MDS), which consists of four phases: data-collection, context-representation, context-reference construction, and misbehavior detection. Data-centric and behavioral-detection-based features are derived to represent the vehicular context. An online and timely updated context-reference model is built using unsupervised nonparametric statistical methods, namely Kalman and Hampel filters, through analyzing the temporal and spatial correlation of the consistency between mobility information to adapt to the highly dynamic vehicular context. Vehicles’ behaviors are evaluated locally and autonomously according to the consistency, plausibility, and reliability of their mobility information. The results from extensive simulations show that HCA-MDS outperforms existing solutions in increasing the detection rate by 38% and decreasing the false positive rate by 7%. These results demonstrate the effectiveness and robustness of the proposed HCA-MDS model to strengthen the security of VANET applications and protocols

    Non-cooperative power control game in D2D underlying networks with variant system conditions

    Get PDF
    In this paper, the problem of power control using a game theoretic approach based on sigmoid cost function is studied for device-to-device (D2D) communications underlying cellular networks. A non-cooperative game, where each D2D transmitter and a cellular user select their own transmit power level independently, is analyzed to minimize their user-serving cost function and achieve a target signal to interference-plus-noise-ratio (SINR) requirement. It is proved analytically that the Nash equilibrium point of the game exists and it is unique under certain constraints. Numerical results verify the analysis and demonstrate the effectiveness of the proposed game with variant system conditions, such as path loss exponents, target SINR, interference caused by the cellular user, pricing coefficients, and sigmoid control parameter
    corecore