5 research outputs found

    Correlation studies of PITS, Hall Effect and Van Der Pauw characterizations of GaAs substrates

    Get PDF
    Call number: LD2668 .T4 EECE 1989 D56Master of ScienceElectrical and Computer Engineerin

    Power Maximization and Turbulence Intensity Management through Axial Induction-Based Optimization and Efficient Static Turbine Deployment

    Get PDF
    Layout optimization is capable of increasing turbine density and reducing wake effects in wind plants. However, such optimized layouts do not guarantee fixed T-2-T distances in any direction and would be disadvantageous if reduction in computational costs due to turbine set-point updates is also a priority. Regular turbine layouts are considered basic because turbine coordinates can be determined intuitively without the application of any optimization algorithms. However, such layouts can be used to intentionally create directions of large T-2-T distances, hence, achieve the gains of standard/non-optimized operations in these directions, while also having close T-2-T distances in other directions from which the gains of optimized operations can be enjoyed. In this study, a regular hexagonal turbine layout is used to deploy turbines within a fixed area dimension, and a turbulence intensity-constrained axial induction-based plant-wide optimization is carried out using particle swarm, artificial bee colony, and differential evolution optimization techniques. Optimized plant power for three close turbine deployments (4D, 5D, and 6D) are compared to a non-optimized 7D deployment using three mean wind inflows. Results suggest that a plant power increase of up to 37% is possible with a 4D deployment, with this increment decreasing as deployment distance increases and as mean wind inflow increases

    Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

    Get PDF
    Widespread adoption of cloud computing has increased the attractiveness of such services to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud’s bandwidth, services and resources to render the cloud unavailable to both cloud providers, and users are a common form of attacks. In recent times, feature selection has been identified as a pre-processing phase in cloud DDoS attack defence which can potentially increase classification accuracy and reduce computational complexity by identifying important features from the original dataset during supervised learning. In this work, we propose an ensemble-based multi-filter feature selection method that combines the output of four filter methods to achieve an optimum selection. We then perform an extensive experimental evaluation of our proposed method using intrusion detection benchmark dataset, NSL-KDD and decision tree classifier. The findings show that our proposed method can effectively reduce the number of features from 41 to 13 and has a high detection rate and classification accuracy when compared to other classification techniques

    From Cloud to Fog Computing

    No full text
    Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined.Peer reviewe
    corecore