5 research outputs found
Correlation studies of PITS, Hall Effect and Van Der Pauw characterizations of GaAs substrates
Call number: LD2668 .T4 EECE 1989 D56Master of ScienceElectrical and Computer Engineerin
Power Maximization and Turbulence Intensity Management through Axial Induction-Based Optimization and Efficient Static Turbine Deployment
Layout optimization is capable of increasing turbine density and reducing wake effects in wind plants. However, such optimized layouts do not guarantee fixed T-2-T distances in any direction and would be disadvantageous if reduction in computational costs due to turbine set-point updates is also a priority. Regular turbine layouts are considered basic because turbine coordinates can be determined intuitively without the application of any optimization algorithms. However, such layouts can be used to intentionally create directions of large T-2-T distances, hence, achieve the gains of standard/non-optimized operations in these directions, while also having close T-2-T distances in other directions from which the gains of optimized operations can be enjoyed. In this study, a regular hexagonal turbine layout is used to deploy turbines within a fixed area dimension, and a turbulence intensity-constrained axial induction-based plant-wide optimization is carried out using particle swarm, artificial bee colony, and differential evolution optimization techniques. Optimized plant power for three close turbine deployments (4D, 5D, and 6D) are compared to a non-optimized 7D deployment using three mean wind inflows. Results suggest that a plant power increase of up to 37% is possible with a 4D deployment, with this increment decreasing as deployment distance increases and as mean wind inflow increases
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Widespread adoption of cloud computing has increased the attractiveness of such services to cybercriminals.
Distributed denial of service (DDoS) attacks targeting the cloud’s bandwidth, services and resources to render the
cloud unavailable to both cloud providers, and users are a common form of attacks. In recent times, feature
selection has been identified as a pre-processing phase in cloud DDoS attack defence which can potentially
increase classification accuracy and reduce computational complexity by identifying important features from the
original dataset during supervised learning. In this work, we propose an ensemble-based multi-filter feature
selection method that combines the output of four filter methods to achieve an optimum selection. We then
perform an extensive experimental evaluation of our proposed method using intrusion detection benchmark
dataset, NSL-KDD and decision tree classifier. The findings show that our proposed method can effectively reduce
the number of features from 41 to 13 and has a high detection rate and classification accuracy when compared to
other classification techniques
From Cloud to Fog Computing
Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined.Peer reviewe