International Journal of Electrical Engineering and Computer Science最新文献

筛选
英文 中文
Security Concerns of IoT Against DDoS in 5G Systems 物联网应对 5G 系统中 DDoS 的安全问题
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-03-26 DOI: 10.37394/232027.2024.6.11
U. Maiwada, Shahbaz Ali Imran, K. U. Danyaro, A. Janisar, Anas Salameh, A. Sarlan
{"title":"Security Concerns of IoT Against DDoS in 5G Systems","authors":"U. Maiwada, Shahbaz Ali Imran, K. U. Danyaro, A. Janisar, Anas Salameh, A. Sarlan","doi":"10.37394/232027.2024.6.11","DOIUrl":"https://doi.org/10.37394/232027.2024.6.11","url":null,"abstract":"The Internet of Things (IoT), which enables seamless connectivity and communication between gadgets and the internet has completely changed how people interact with and use technology in 5G. Distributed Denial of Service (DDoS) assaults are now recognized as a serious security concern because of the rapid expansion of IoT devices, which has also brought about new security issues. DDoS attacks plan massive, coordinated attacks that overwhelm target systems and impair their functions by taking advantage of the interconnectedness of IoT devices. This paper explores the vulnerabilities in IoT devices and their possible exploitation by hostile actors, providing an in-depth examination of IoT and DDoS assault dynamics in 5G. The report emphasizes the need for preventative security measures by highlighting the growing size and complexity of DDoS attacks employing compromised IoT botnets. The examination of various DDoS attack channels and methodologies against IoT devices sheds light on the growing strategies used by attackers to infiltrate and manage IoT botnets. To emphasize how urgent it is to mitigate such risks, the effects of DDoS assaults on vital infrastructures, companies, and end-users are also emphasized. The paper also evaluates current mitigation techniques and security safeguards intended to counter IoT-based DDoS attacks. These include the use of security in Nexus that prioritize device authentication, encryption, and secure communication protocols as well as network traffic filtering and anomaly detection. Relevant case studies and real-world examples are provided to give readers a thorough understanding of the topic while demonstrating the scope and effects of recent IoT-based DDoS attacks. The paper guides different approaches through which DDOS can harm the server/ system (or anything, which is belonging to the family of the Internet of things) through different types; DDOS can be minimized but impossible to overcome. In this paper, we also have proved that due to IOT, the ratio of DDOS has increased by implementing these measures and continuously monitoring the network for potential threats. 5G systems can enhance their security posture and provide a safer and more reliable communication infrastructure for users and businesses by mitigating DDoS.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"21 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140378740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequentially Triggering “Time-Bomb” Trojan into Hardware Wired Microsequencer 在硬件有线微序器中顺序触发 "定时炸弹 "木马程序
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-03-19 DOI: 10.37394/232027.2024.6.10
Grigore Mihai Timiș, A. Valachi
{"title":"Sequentially Triggering “Time-Bomb” Trojan into Hardware Wired Microsequencer","authors":"Grigore Mihai Timiș, A. Valachi","doi":"10.37394/232027.2024.6.10","DOIUrl":"https://doi.org/10.37394/232027.2024.6.10","url":null,"abstract":"This paper presents an analysis of a sequential Triggered “Time Bomb” hardware Trojan (HT). Major security concerns have been rising up since malicious modification of hardware or fabrication IC can lead to an altered functional behavior, potentially with disastrous consequences in safety-critical applications. Due to the stealthy nature of the hardware Trojans the conventional design and time verification and post manufacturing testing cannot be readily extended. There are a large number of possible instances and operating modes for the hardware Trojans in a digital system. Since the hardware Trojan insertion can modify the functionality of the digital integrated circuit (IC), alter its behavior, generate denial of service (DoS), the HT threats should be analyzed with maximum importance through the entire lifecycle of the IC.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"12 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140230610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake Currency Detection using Modified Faster Region-Based Convolutional Neural Network 利用修改后的基于区域的更快卷积神经网络检测假币
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-01-30 DOI: 10.37394/232027.2024.6.5
O. Ibitoye
{"title":"Fake Currency Detection using Modified Faster Region-Based Convolutional Neural Network","authors":"O. Ibitoye","doi":"10.37394/232027.2024.6.5","DOIUrl":"https://doi.org/10.37394/232027.2024.6.5","url":null,"abstract":"Significant technological advancements in the printing and scanning industries exacerbated the counterfeiting problem. As a consequence, counterfeit currency has an impact on the economy and diminishes the value of genuine currency. Therefore, it is essential to detect the counterfeit currency. The majority of previous methods rely on hardware and image processing techniques. Using these methods to detect counterfeit currency is inefficient and time-consuming. We have proposed a system for the detection of counterfeit currency using a modified faster region-based convolution neural network (Faster R-CNN) to circumvent the aforementioned issue. This study identifies counterfeit currency by analyzing images of currency. One thousand images of currency note are used as dataset to train a Faster-RCNN model on inception V2 architecture to learn the feature map of currencies. Upon successful training and validation of the model, 500 images of counterfeit currencies were used to test the model. The proposed method efficiently identifies 96% of counterfeit currency images tested. Other evaluation means such as mean average precision and detection accuracy show that the developed system has an accuracy of 97%.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"132 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140480604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANFIS-Fuzzy Logic-based Hybrid DFIG and PMSG Grid Connected System with TCSC 基于 ANFIS-Fuzzy Logic 的带 TCSC 的 DFIG 和 PMSG 混合并网系统
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-01-30 DOI: 10.37394/232027.2024.6.6
K. Karthi, A. Ramkumar
{"title":"ANFIS-Fuzzy Logic-based Hybrid DFIG and PMSG Grid Connected System with TCSC","authors":"K. Karthi, A. Ramkumar","doi":"10.37394/232027.2024.6.6","DOIUrl":"https://doi.org/10.37394/232027.2024.6.6","url":null,"abstract":"Variable-speed wind turbines might provide green electricity. Grid operators’ grid regulations require wind turbines to recover from grid disruptions and help maintain electricity networks. Having wind turbines equipped with fault current limiters (FCLs) may ensure their continued functioning in the event of a power loss. In this piece, we will talk about how to improve the two most common types of variable-speed wind turbines: the Doubly Fed Induction Generator (DFIG) and the Permanent Magnet Synchronous Generator (PMSG). Both wind generators were evaluated using the Thyristor Controlled Series Compensator (TCSC) with ANFIS and Fuzzy Logic. It is important to understand the dynamic behavior of wind turbines, hence models of their FCLs were built for steady state and grid disruptions. Power interruptions switched the FCLs in both wind turbines utilising grid voltage variation. Both wind turbines underwent a no-control FCL scenario. Both wind turbines’ FCLs were measured and compared under load from a severe three-phase to ground failure at their terminals. Both wind turbines were operated under similar circumstances to examine FCL control tactics during power interruptions.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"31 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140482660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fabrication of a Simple Computerized High Power Supply for Magnetic Measurements 制作用于磁性测量的简易计算机化大功率电源
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-01-30 DOI: 10.37394/232027.2024.6.8
Sadeq H. Lafta, Ekhals Abbas Albahrani
{"title":"Fabrication of a Simple Computerized High Power Supply for Magnetic Measurements","authors":"Sadeq H. Lafta, Ekhals Abbas Albahrani","doi":"10.37394/232027.2024.6.8","DOIUrl":"https://doi.org/10.37394/232027.2024.6.8","url":null,"abstract":"A High current power supply was built and controlled by a personal computer using a simple design and a low-cost components for magnetic measurement applications. The design depends on the Arduino Uno board and Scilab software. Three Scilab block diagrams were given to simulate three magnetic tests, which are constant field block diagram (single field value), increasing and decreasing fields for FMR and magnetocaloric tests, and field for hysteresis loop test. Each Scilab block diagram contained different xcos blocks to control the Arduino output voltage and other blocks to sense, read, and calibrate the field value. This control was done via controlling pulse width modulation in the range (0-255). The output of each block diagram was simulated by measuring its variation with time using a cscope block display. The Arduino signal was amplified by a simple electronic circuit that involved two stages, BUL680 transistor as the first stage. Two high-power transistors EVK71-050 or Q50z were used in the second stage. The output of 107V-39.8A from the first one and 108V- 39.7A from the second one produces a magnetic field of about 30000Oe. The linearity between the current and the field value is better for Q50z due to the variation of α with the wide variation of collector current.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"340 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140483434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design a Controller Based on Smith Predictor by Direct Synthesis method for Speed Control DC Motor 用直接合成法设计基于史密斯预测器的控制器,用于直流电机调速
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-01-30 DOI: 10.37394/232027.2024.6.9
Arun Yadav, Maneesh Kumar Gupta
{"title":"Design a Controller Based on Smith Predictor by Direct Synthesis method for Speed Control DC Motor","authors":"Arun Yadav, Maneesh Kumar Gupta","doi":"10.37394/232027.2024.6.9","DOIUrl":"https://doi.org/10.37394/232027.2024.6.9","url":null,"abstract":"The modified Smith predictor is designed for a speed control DC motor. A speed controller of a DC motor by selection of PID parameters using direct synthesis method. Here, the model of a DC motor is considered as a second-order system for speed control. The PID and PD controller structure reported recently decouples set-point tracking from disturbance rejection. This work aims to design a speed controller of a DC motor by selecting of proper PID. Simulation examples show that improved servo and regulatory performances are achieved by the proposed method as compared to the normal tune PID method and also checked by perturbed performance. When used for regulatory/servo purposes, a controller optimized for servo/regulatory application significantly degrades performance.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"44 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140480875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Implementation for the Robust Controller of the Switched Boost Inverter within an Autonomous Modified Nanogrid 自主改进型纳米网格内开关升压逆变器鲁棒控制器的实时实现
International Journal of Electrical Engineering and Computer Science Pub Date : 2024-01-16 DOI: 10.37394/232027.2024.6.1
E. A. Ebrahim, N. Maged
{"title":"Real-Time Implementation for the Robust Controller of the Switched Boost Inverter within an Autonomous Modified Nanogrid","authors":"E. A. Ebrahim, N. Maged","doi":"10.37394/232027.2024.6.1","DOIUrl":"https://doi.org/10.37394/232027.2024.6.1","url":null,"abstract":"SBI stands for switched-boost inverter and is a single-stage power converter used to connect low-power sources, such as solar photovoltaic (PV) arrays within a modified nanogrid, to loads. Despite its many benefits, such as the fact that it does not require expensive sophisticated dead-time circuitry, its duty ratio is limited to between 0 and 0.5. As a result, this publication is a contribution towards improving the SBI's performance for use in a modified nanogrid. Furthermore, it also presents a revolutionary strategy for a simple closed-loop control technique that overcomes the majority of inverter shortcomings and system nonlinearity. The suggested robust controller uses a metaheuristic optimization technique, called gorilla troops optimization (GTO), to optimize the performance of this controller. The robustness of the suggested controller is tested against the sudden change of the nanogrid input voltage (i.e., PV-voltage), modulation index of the inverter, and the step-change in DC-link output voltage of the inverter. The test results obtained from Matlab/Simulink software are compared with particle swarm optimization (PSO) – as another optimization algorithm. Furthermore, the proposed system is experimentally implemented with OPAL RT-4510v real-time hardware in the loop (HIL), rapid control prototyping, OP-8660 HIL controller and data acquisition platform.","PeriodicalId":475274,"journal":{"name":"International Journal of Electrical Engineering and Computer Science","volume":"75 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140505636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信