An adaptive approach to opportunistic data forwarding in underwater acoustic sensor networks
- Nowsheen, Nusrat, Karmakar, Gour, Kamruzzaman, Joarder
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Reliable data transfer for underwater acoustic sensor networks (UASNs) is a major research challenge in applications such as pollution monitoring, oceanic data collection, and surveillance due to the long propagation delay and high error rate of the acoustic channel. To address this issue, an opportunistic data forwarding protocol was proposed which achieves high packet delivery success ratio with less routing overhead and energy consumption by selecting the next hop forwarder among a set of candidates based on its link reliability and data transfer reach ability. However, the protocol relies on fixed data hold time approach, i.e., Each node holds data packets for a fixed amount of time before a forwarder discovery process is initiated. Depending on the value of the fixed hold time and deployment contextual scenario, this may incur large end-to-end delay. Moreover, lack of consideration of network condition in hold time limits its performance. In this paper, we propose an adaptive technique to improve its performance. The adaptive approach calculates data hold time at each node dynamically considering a number of 'node and network' metrics including current buffer occupancy, delay experienced by stored data packets, arrival and service rate, neighbors' data transmissions and reach ability. Simulation results show that compared with fixed hold time approach, our adaptive technique reduces end-to-end delay significantly, achieves considerably higher data delivery and less energy consumption per successful packet delivery.
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Reliable data transfer for underwater acoustic sensor networks (UASNs) is a major research challenge in applications such as pollution monitoring, oceanic data collection, and surveillance due to the long propagation delay and high error rate of the acoustic channel. To address this issue, an opportunistic data forwarding protocol was proposed which achieves high packet delivery success ratio with less routing overhead and energy consumption by selecting the next hop forwarder among a set of candidates based on its link reliability and data transfer reach ability. However, the protocol relies on fixed data hold time approach, i.e., Each node holds data packets for a fixed amount of time before a forwarder discovery process is initiated. Depending on the value of the fixed hold time and deployment contextual scenario, this may incur large end-to-end delay. Moreover, lack of consideration of network condition in hold time limits its performance. In this paper, we propose an adaptive technique to improve its performance. The adaptive approach calculates data hold time at each node dynamically considering a number of 'node and network' metrics including current buffer occupancy, delay experienced by stored data packets, arrival and service rate, neighbors' data transmissions and reach ability. Simulation results show that compared with fixed hold time approach, our adaptive technique reduces end-to-end delay significantly, achieves considerably higher data delivery and less energy consumption per successful packet delivery.
The importance of mandatory data breach notification to identity crime
- Holm, Eric, Mackenzie, Geraldine
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
- Authors: Holm, Eric , Mackenzie, Geraldine
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification information and identity crime as the former is in many respects the catalyst for the latter. Data breaches are one of the ways in which this personal identification information is obtained by identity criminals, and thereby any response to data breaches is likely to impact the incidence of identity crime. Initiatives around data breach notification have become increasingly prevalent and are now seen in many State legislatures in the United States and overseas. The Australian Government is currently in the process of introducing mandatory data breach notification laws. This paper explores the introduction of mandatory data breach notification in Australia, and lessons learned from the experience in the US, particularly noting the link between data breaches and identity crime. The paper proposes that through the introduction of such laws, identity crimes are likely to be reduced.
Exploring the application of artificial neural network in rural streamflow prediction - A feasibility study
- Choudhury, Tanveer, Wei, Jackie, Barton, Andrew, Kandra, Harpreet, Aziz, Abdul
- Authors: Choudhury, Tanveer , Wei, Jackie , Barton, Andrew , Kandra, Harpreet , Aziz, Abdul
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 27th IEEE International Symposium on Industrial Electronics, ISIE 2018; Cairns, Australia; 13th-15th June 2018 Vol. 2018-June, p. 753-758
- Full Text:
- Reviewed:
- Description: Streams and rivers play a critical role in the hydrologic cycle with their management being essential to maintaining a balance across social, economic and environmental outcomes. Accurate streamflow predictions can provide benefits in many different ways such as water allocation decision making, flood forecasting and environmental watering regimes. This is particularly important in regional areas of Australia where rivers can play a critical role in irrigated agriculture, recreation and social wellbeing, major floods and sustainable environments. There are several hydrological parameters that effect stream flows in rivers and a major challenge with any prediction methodology, is to understand these parameter interdependencies, correlations and their individual effects. A robust methodology is, thus, required for accurate prediction of streamflow under usually unique, waterway-specific conditions using available data. This research employs an approach based on Artificial Neural Network (ANN) to provide this robust methodology. Data from readily available sources has been selected to provide appropriate input and output parameters to train, validate and optimise the neural network. The optimisation steps of the methodology are discussed and the predicted outputs are compared and analysed with respect to the actual collected values. © 2018 IEEE.
- Description: IEEE International Symposium on Industrial Electronics
- Authors: Choudhury, Tanveer , Wei, Jackie , Barton, Andrew , Kandra, Harpreet , Aziz, Abdul
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 27th IEEE International Symposium on Industrial Electronics, ISIE 2018; Cairns, Australia; 13th-15th June 2018 Vol. 2018-June, p. 753-758
- Full Text:
- Reviewed:
- Description: Streams and rivers play a critical role in the hydrologic cycle with their management being essential to maintaining a balance across social, economic and environmental outcomes. Accurate streamflow predictions can provide benefits in many different ways such as water allocation decision making, flood forecasting and environmental watering regimes. This is particularly important in regional areas of Australia where rivers can play a critical role in irrigated agriculture, recreation and social wellbeing, major floods and sustainable environments. There are several hydrological parameters that effect stream flows in rivers and a major challenge with any prediction methodology, is to understand these parameter interdependencies, correlations and their individual effects. A robust methodology is, thus, required for accurate prediction of streamflow under usually unique, waterway-specific conditions using available data. This research employs an approach based on Artificial Neural Network (ANN) to provide this robust methodology. Data from readily available sources has been selected to provide appropriate input and output parameters to train, validate and optimise the neural network. The optimisation steps of the methodology are discussed and the predicted outputs are compared and analysed with respect to the actual collected values. © 2018 IEEE.
- Description: IEEE International Symposium on Industrial Electronics
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Performance monitoring of a PMU in a microgrid environment based on IEC 61850-90-5
- Kumar, Shantanu, Das, Narottam, Islam, Syed
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 2016 Australasian Universities Power Engineering Conference, AUPEC 2016; Brisbane, Australia; 25th-28th September 2016 p. 1-5
- Full Text:
- Reviewed:
- Description: Reliable protection, communication and control are the key features of a digital protection scheme in a utility substation. Microgrid is an alternative solution of installing long Transmission & Distribution lines could be cost prohibitive. There are number of Intelligent Electronic Devices (IEDs) which could find applications in controlling and monitoring of power network in a Microgrid set up and one such device is Phasor Measurement Unit (PMU). It is a microprocessor based intelligent device which gathers high-resolution data, checks the power quality and records disturbances. However, few issues that remains to be addressed such as, interoperability in a multi-vendor equipment and coordination between individual control systems in an integrated scheme. In this paper, an Operational Network Technology (OPNET) software model of a PMU has been designed and tested for its performance in a Microgrid environment based on IEC 61850-90-5 standard.
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 2016 Australasian Universities Power Engineering Conference, AUPEC 2016; Brisbane, Australia; 25th-28th September 2016 p. 1-5
- Full Text:
- Reviewed:
- Description: Reliable protection, communication and control are the key features of a digital protection scheme in a utility substation. Microgrid is an alternative solution of installing long Transmission & Distribution lines could be cost prohibitive. There are number of Intelligent Electronic Devices (IEDs) which could find applications in controlling and monitoring of power network in a Microgrid set up and one such device is Phasor Measurement Unit (PMU). It is a microprocessor based intelligent device which gathers high-resolution data, checks the power quality and records disturbances. However, few issues that remains to be addressed such as, interoperability in a multi-vendor equipment and coordination between individual control systems in an integrated scheme. In this paper, an Operational Network Technology (OPNET) software model of a PMU has been designed and tested for its performance in a Microgrid environment based on IEC 61850-90-5 standard.
Exploiting user provided information in dynamic consolidation of virtual machines to minimize energy consumption of cloud data centers
- Khan, Anit, Paplinski, Andrew, Khan, Abdul, Murshed, Manzur, Buyya, Rajkumar
- Authors: Khan, Anit , Paplinski, Andrew , Khan, Abdul , Murshed, Manzur , Buyya, Rajkumar
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018; Barcelona, Spain; 23rd-26th April 2018; p. 105-114
- Full Text:
- Reviewed:
- Description: Dynamic consolidation of Virtual Machines (VMs) can effectively enhance the resource utilization and energy-efficiency of the Cloud Data Centers (CDC). Existing research on Cloud resource reservation and scheduling signify that Cloud Service Users (CSUs) can play a crucial role in improving the resource utilization by providing valuable information to Cloud service providers. However, utilization of CSUs' provided information in minimization of energy consumption of CDC is a novel research direction. The challenges herein are twofold. First, finding the right benign information to be received from a CSU which can complement the energy-efficiency of CDC. Second, smart application of such information to significantly reduce the energy consumption of CDC. To address those research challenges, we have proposed a novel heuristic Dynamic VM Consolidation algorithm, RTDVMC, which minimizes the energy consumption of CDC through exploiting CSU provided information. Our research exemplifies the fact that if VMs are dynamically consolidated based on the time when a VM can be removed from CDC-a useful information to be received from respective CSU, then more physical machines can be turned into sleep state, yielding lower energy consumption. We have simulated the performance of RTDVMC with real Cloud workload traces originated from more than 800 PlanetLab VMs. The empirical figures affirm the superiority of RTDVMC over existing prominent Static and Adaptive Threshold based DVMC algorithms.
- Authors: Khan, Anit , Paplinski, Andrew , Khan, Abdul , Murshed, Manzur , Buyya, Rajkumar
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018; Barcelona, Spain; 23rd-26th April 2018; p. 105-114
- Full Text:
- Reviewed:
- Description: Dynamic consolidation of Virtual Machines (VMs) can effectively enhance the resource utilization and energy-efficiency of the Cloud Data Centers (CDC). Existing research on Cloud resource reservation and scheduling signify that Cloud Service Users (CSUs) can play a crucial role in improving the resource utilization by providing valuable information to Cloud service providers. However, utilization of CSUs' provided information in minimization of energy consumption of CDC is a novel research direction. The challenges herein are twofold. First, finding the right benign information to be received from a CSU which can complement the energy-efficiency of CDC. Second, smart application of such information to significantly reduce the energy consumption of CDC. To address those research challenges, we have proposed a novel heuristic Dynamic VM Consolidation algorithm, RTDVMC, which minimizes the energy consumption of CDC through exploiting CSU provided information. Our research exemplifies the fact that if VMs are dynamically consolidated based on the time when a VM can be removed from CDC-a useful information to be received from respective CSU, then more physical machines can be turned into sleep state, yielding lower energy consumption. We have simulated the performance of RTDVMC with real Cloud workload traces originated from more than 800 PlanetLab VMs. The empirical figures affirm the superiority of RTDVMC over existing prominent Static and Adaptive Threshold based DVMC algorithms.
High performance communication redundancy in a digital substation based on IEC 62439-3 with a station bus configuration
- Kumar, Shantanu, Das, Narottam, Islam, Syed
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Australasian Universities Power Engineering Conference, AUPEC 2015; Wollongong, Australia; 27th-30th September 2015 p. 1-5
- Full Text:
- Reviewed:
- Description: High speed communication is critical in a digital substation from protection, control and automation perspectives. Although International Electro-Technical Commission (IEC) 61850 standard has proven to be a reliable guide for the substation automation and communication systems, yet it has few shortcomings in offering redundancies in the protection architecture, which has been addressed better in IEC 62439-3 standard encompassing Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR). Due to single port failure, data losses and interoperability issues related to multi-vendor equipment, IEC working committee had to look beyond IEC 61850 standard. The enhanced features in a Doubly Attached Node components based on IEC 62439-3 provides redundancy in protection having two active frames circulating data packets in the ring. These frames send out copies in the ring and should one of the frame is lost, the other copy manages to reach the destination node via an alternate path, ensuring flawless data transfer at a significant faster speed using multi-vendor equipment and fault resilient circuits. The PRP and HSR topologies provides higher performance in a digitally protected substation and promise better future over the IEC 61850 standard due to its faster processing capabilities, increased availability and minimum delay in data packet transfer and wireless communication in the network. This paper exhibits the performance of PRP and HSR topologies focusing on the redundancy achievement within the network and at the end nodes of a station bus ring architecture, based on IEC 62439-3.
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Australasian Universities Power Engineering Conference, AUPEC 2015; Wollongong, Australia; 27th-30th September 2015 p. 1-5
- Full Text:
- Reviewed:
- Description: High speed communication is critical in a digital substation from protection, control and automation perspectives. Although International Electro-Technical Commission (IEC) 61850 standard has proven to be a reliable guide for the substation automation and communication systems, yet it has few shortcomings in offering redundancies in the protection architecture, which has been addressed better in IEC 62439-3 standard encompassing Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR). Due to single port failure, data losses and interoperability issues related to multi-vendor equipment, IEC working committee had to look beyond IEC 61850 standard. The enhanced features in a Doubly Attached Node components based on IEC 62439-3 provides redundancy in protection having two active frames circulating data packets in the ring. These frames send out copies in the ring and should one of the frame is lost, the other copy manages to reach the destination node via an alternate path, ensuring flawless data transfer at a significant faster speed using multi-vendor equipment and fault resilient circuits. The PRP and HSR topologies provides higher performance in a digitally protected substation and promise better future over the IEC 61850 standard due to its faster processing capabilities, increased availability and minimum delay in data packet transfer and wireless communication in the network. This paper exhibits the performance of PRP and HSR topologies focusing on the redundancy achievement within the network and at the end nodes of a station bus ring architecture, based on IEC 62439-3.
A scalable cloud Platform for Active healthcare monitoring applications
- Balasubramanian, Venki, Stranieri, Andrew
- Authors: Balasubramanian, Venki , Stranieri, Andrew
- Date: 2015
- Type: Text , Conference paper
- Relation: 2014 IEEE Conference on e-Learning, e-Management and e-Services, IC3e 2014; Melbourne, Australia; 10th-12th December 2014 p. 93-98
- Full Text:
- Reviewed:
- Description: Continuous, remote monitoring of patients using wearable sensors can facilitate early detection of many conditions and can help to manage the growing healthcare crisis worldwide. A remote patient monitoring application consists of many emerging services such as wireless wearable sensor configuration, patient registration and authentication, collaborative consultation of doctors, storage and maintenance of electronic health record. The provision of these services requires the development and maintenance of a remote healthcare monitoring application (HMA) that includes a body area wireless sensor network (BASWN) and Health Applications (HA) to detect specific health issues. In addition, the deployment of HMAs for different hospitals is not easily scalable owing to the heterogeneous nature of hardware and software involved. Cloud computing overcomes this aspect by allowing simple and easy maintenance of ICT infrastructure. In this work, we report a real-time-like cloud based architecture known as Assistive Patient monitoring cloud Platform for Active healthcare applications (AppA) using a delegate pattern. The built AppA is highly scalable and capable of spawning new instances based on monitoring requirements from the health care providers, and are aligned with scalable economic models. © 2014 IEEE.
- Authors: Balasubramanian, Venki , Stranieri, Andrew
- Date: 2015
- Type: Text , Conference paper
- Relation: 2014 IEEE Conference on e-Learning, e-Management and e-Services, IC3e 2014; Melbourne, Australia; 10th-12th December 2014 p. 93-98
- Full Text:
- Reviewed:
- Description: Continuous, remote monitoring of patients using wearable sensors can facilitate early detection of many conditions and can help to manage the growing healthcare crisis worldwide. A remote patient monitoring application consists of many emerging services such as wireless wearable sensor configuration, patient registration and authentication, collaborative consultation of doctors, storage and maintenance of electronic health record. The provision of these services requires the development and maintenance of a remote healthcare monitoring application (HMA) that includes a body area wireless sensor network (BASWN) and Health Applications (HA) to detect specific health issues. In addition, the deployment of HMAs for different hospitals is not easily scalable owing to the heterogeneous nature of hardware and software involved. Cloud computing overcomes this aspect by allowing simple and easy maintenance of ICT infrastructure. In this work, we report a real-time-like cloud based architecture known as Assistive Patient monitoring cloud Platform for Active healthcare applications (AppA) using a delegate pattern. The built AppA is highly scalable and capable of spawning new instances based on monitoring requirements from the health care providers, and are aligned with scalable economic models. © 2014 IEEE.
Multi-agent systems in ICT enabled smart grid : A status update on technology framework and applications
- Shawon, Mohammad, Muyeen, S., Ghosh, Arindam, Islam, Syed, Baptista, Murilo
- Authors: Shawon, Mohammad , Muyeen, S. , Ghosh, Arindam , Islam, Syed , Baptista, Murilo
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 97959-97973
- Full Text:
- Reviewed:
- Description: Multi-agent-based smart grid applications have gained much attention in recent times. At the same time, information and communication technology (ICT) has become a crucial part of the smart grid infrastructure. The key intention of this work is to present a comprehensive review of the literature and technological frameworks for the application of multi-agent system (MAS) and ICT infrastructure usages in smart grid implementations. In the smart grid, agents are defined as intelligent entities with the ability to take decisions and acting flexibly and autonomously according to their built-in intelligence utilizing previous experiences. Whereas, ICT enables conventional grid turned into the smart grid through data and information exchange. This paper summarizes the multi-agent concept of smart grid highlighting their applications through a detailed and extensive literature survey on the related topics. In addition to the above, a particular focus has been put on the ICT standards, including IEC 61850 incorporating ICT with MAS. Finally, a laboratory framework concepts have been added highlighting the implementation of IEC 61850.
- Authors: Shawon, Mohammad , Muyeen, S. , Ghosh, Arindam , Islam, Syed , Baptista, Murilo
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 97959-97973
- Full Text:
- Reviewed:
- Description: Multi-agent-based smart grid applications have gained much attention in recent times. At the same time, information and communication technology (ICT) has become a crucial part of the smart grid infrastructure. The key intention of this work is to present a comprehensive review of the literature and technological frameworks for the application of multi-agent system (MAS) and ICT infrastructure usages in smart grid implementations. In the smart grid, agents are defined as intelligent entities with the ability to take decisions and acting flexibly and autonomously according to their built-in intelligence utilizing previous experiences. Whereas, ICT enables conventional grid turned into the smart grid through data and information exchange. This paper summarizes the multi-agent concept of smart grid highlighting their applications through a detailed and extensive literature survey on the related topics. In addition to the above, a particular focus has been put on the ICT standards, including IEC 61850 incorporating ICT with MAS. Finally, a laboratory framework concepts have been added highlighting the implementation of IEC 61850.
Efficient route selection in ad hoc on-demand distance vector routing
- Uddin, Ashraf, Akther, Arnisha, Parvez, Shamima, Stranieri, Andrew
- Authors: Uddin, Ashraf , Akther, Arnisha , Parvez, Shamima , Stranieri, Andrew
- Date: 2017
- Type: Text , Conference paper
- Relation: 20th International Conference of Computer and Information, IICIT 2017; Dhaka, Bangladesh; 22nd-24th December 2017 p. 1-6
- Full Text:
- Reviewed:
- Description: The protocol diversities of mobile ad hoc have already got hold of the field to a peak of a matured and developed area. Still, the restraint of delay and bandwidth of mobile ad hoc network have kept a little room to draft a routing protocol for the pursuit of providing quality of service. In the paper, we proposed protocol namely Efficient Route Selection in Ad Hoc On-Demand Distance Vector Routing. We select the best path among multiple paths from source to destination using covariance and delay. We consider the delay, link stability and energy to devise a covariance-based metric to discover the most balanced path. We also propose a metric for the selection of a node that acts as a local backup node for the most vulnerable nodes on the selected path. We accomplish our implementation in NS3and it shows the more reliable path and less end to end delay than other counterpart protocols.
- Authors: Uddin, Ashraf , Akther, Arnisha , Parvez, Shamima , Stranieri, Andrew
- Date: 2017
- Type: Text , Conference paper
- Relation: 20th International Conference of Computer and Information, IICIT 2017; Dhaka, Bangladesh; 22nd-24th December 2017 p. 1-6
- Full Text:
- Reviewed:
- Description: The protocol diversities of mobile ad hoc have already got hold of the field to a peak of a matured and developed area. Still, the restraint of delay and bandwidth of mobile ad hoc network have kept a little room to draft a routing protocol for the pursuit of providing quality of service. In the paper, we proposed protocol namely Efficient Route Selection in Ad Hoc On-Demand Distance Vector Routing. We select the best path among multiple paths from source to destination using covariance and delay. We consider the delay, link stability and energy to devise a covariance-based metric to discover the most balanced path. We also propose a metric for the selection of a node that acts as a local backup node for the most vulnerable nodes on the selected path. We accomplish our implementation in NS3and it shows the more reliable path and less end to end delay than other counterpart protocols.
Disconnection time and sequence of rooftop PVs under short-circuit faults in low voltage networks
- Yengejeh, Hadi, Shahnia, Farhad, Islam, Syed
- Authors: Yengejeh, Hadi , Shahnia, Farhad , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: North American Power Symposium, NAPS 2015; Charlotte, United States; 4th-6th October 2015 p. 1-6
- Full Text:
- Reviewed:
- Description: This paper presents an analysis on the disconnection time of single-phase rooftop PVs, located in a three-phase four-wire low voltage distribution feeder after a line-to-ground short-circuit fault on the low voltage feeder. The paper aims to evaluate and discuss the disconnection time and sequence of PVs in a network with 100% PV penetration level. The impact of different parameters such as the location of the fault, impedance of the fault and the ratio of PVs generation capacity to the load demand are considered. Furthermore, the effect of the system earthing in the form of multiple earthed neutral and non-effectively grounded systems are evaluated on the PVs disconnection time. The analyses intend to figure out the conditions under which the PVs in the feeder may fail to disconnect after a line-to-ground fault and keep feeding the fault. The analyses are carried out in PSCAD/EMTDC software.
- Authors: Yengejeh, Hadi , Shahnia, Farhad , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: North American Power Symposium, NAPS 2015; Charlotte, United States; 4th-6th October 2015 p. 1-6
- Full Text:
- Reviewed:
- Description: This paper presents an analysis on the disconnection time of single-phase rooftop PVs, located in a three-phase four-wire low voltage distribution feeder after a line-to-ground short-circuit fault on the low voltage feeder. The paper aims to evaluate and discuss the disconnection time and sequence of PVs in a network with 100% PV penetration level. The impact of different parameters such as the location of the fault, impedance of the fault and the ratio of PVs generation capacity to the load demand are considered. Furthermore, the effect of the system earthing in the form of multiple earthed neutral and non-effectively grounded systems are evaluated on the PVs disconnection time. The analyses intend to figure out the conditions under which the PVs in the feeder may fail to disconnect after a line-to-ground fault and keep feeding the fault. The analyses are carried out in PSCAD/EMTDC software.
Software implementation of two seamless redundant topologies in a digital protection system based on IEC 62439-3
- Kumar, Shantanu, Das, Narottam, Islam, Syed
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 2016 Australasian Universities Power Engineering Conference, AUPEC 2016; Brisbane, Australia; 25th-28th September 2016 p. 1-5
- Full Text:
- Reviewed:
- Description: Substations are the junctions of any transmission and distribution network in utilities. They carry bulk power to the customers using transmission network involving high voltage (HV) apparatus. Protection of HV equipment during a fault is the primary concern of an operator. Advancement in design and manufacturing of Intelligent Electronic Devices (IEDs) and IEC 61850 are finding increased application in utilities from automation and communication perspective, which addresses few shortcomings that couldn't be resolved in a conventional system. However there are few challenges in the digital scheme such as end to end delays in the packet transfer and interoperability of devices. Utilities are able to perceive these benefits by leveraging on IEC 62439-3 which has two important topologies i.e. Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR). It offers seamless redundancy in digital protection network without compromising the availability and downtime cost. In this paper, an Optimized Network Engineering Tool (OPNET) is used to simulate and compare the performance of these topologies with respect to delay time.
- Description: Proceedings of the 2016 Australasian Universities Power Engineering Conference, AUPEC 2016
- Authors: Kumar, Shantanu , Das, Narottam , Islam, Syed
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 2016 Australasian Universities Power Engineering Conference, AUPEC 2016; Brisbane, Australia; 25th-28th September 2016 p. 1-5
- Full Text:
- Reviewed:
- Description: Substations are the junctions of any transmission and distribution network in utilities. They carry bulk power to the customers using transmission network involving high voltage (HV) apparatus. Protection of HV equipment during a fault is the primary concern of an operator. Advancement in design and manufacturing of Intelligent Electronic Devices (IEDs) and IEC 61850 are finding increased application in utilities from automation and communication perspective, which addresses few shortcomings that couldn't be resolved in a conventional system. However there are few challenges in the digital scheme such as end to end delays in the packet transfer and interoperability of devices. Utilities are able to perceive these benefits by leveraging on IEC 62439-3 which has two important topologies i.e. Parallel Redundancy Protocol (PRP) and High-availability Seamless Redundancy (HSR). It offers seamless redundancy in digital protection network without compromising the availability and downtime cost. In this paper, an Optimized Network Engineering Tool (OPNET) is used to simulate and compare the performance of these topologies with respect to delay time.
- Description: Proceedings of the 2016 Australasian Universities Power Engineering Conference, AUPEC 2016
A biometric based authentication and encryption Framework for Sensor Health Data in Cloud
- Sharma, Surender, Balasubramanian, Venki
- Authors: Sharma, Surender , Balasubramanian, Venki
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms. © 2014 IEEE.
- Authors: Sharma, Surender , Balasubramanian, Venki
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms. © 2014 IEEE.
Diagnosing transformer winding deformation faults based on the analysis of binary image obtained from FRA signature
- Zhao, Zhongyong, Yao, Chenguo, Tang, Chao, Li, Chengxiang, Yan, Fayou, Islam, Syed
- Authors: Zhao, Zhongyong , Yao, Chenguo , Tang, Chao , Li, Chengxiang , Yan, Fayou , Islam, Syed
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 40463-40474
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) has been widely accepted as a diagnostic tool for power transformer winding deformation faults. Typically, both amplitude-frequency and phase-frequency signatures are obtained by an FRA analyzer. However, most existing FRA analyzers use only the information on amplitude-frequency signature, while phase-frequency information is neglected. It is also found that in some cases, the diagnostic results obtained by FRA amplitude-frequency signatures do not comply with some hard evidence. This paper introduces a winding deformation diagnostic method based on the analysis of binary images obtained from FRA signatures to improve FRA outcomes. The digital image processing technique is used to process the binary image and obtain a diagnostic indicator, to arrive at an outcome for interpreting winding faults with improved accuracy.
- Authors: Zhao, Zhongyong , Yao, Chenguo , Tang, Chao , Li, Chengxiang , Yan, Fayou , Islam, Syed
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Access Vol. 7, no. (2019), p. 40463-40474
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) has been widely accepted as a diagnostic tool for power transformer winding deformation faults. Typically, both amplitude-frequency and phase-frequency signatures are obtained by an FRA analyzer. However, most existing FRA analyzers use only the information on amplitude-frequency signature, while phase-frequency information is neglected. It is also found that in some cases, the diagnostic results obtained by FRA amplitude-frequency signatures do not comply with some hard evidence. This paper introduces a winding deformation diagnostic method based on the analysis of binary images obtained from FRA signatures to improve FRA outcomes. The digital image processing technique is used to process the binary image and obtain a diagnostic indicator, to arrive at an outcome for interpreting winding faults with improved accuracy.
Continuous patient monitoring with a patient centric agent : A block architecture
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 32700-32726
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture.
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 32700-32726
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including continuous remote patient monitoring (RPM). However, the complexity of RPM architectures, the size of data sets generated and limited power capacity of devices make RPM challenging. In this paper, we propose a tier-based End to End architecture for continuous patient monitoring that has a patient centric agent (PCA) as its center piece. The PCA manages a blockchain component to preserve privacy when data streaming from body area sensors needs to be stored securely. The PCA based architecture includes a lightweight communication protocol to enforce security of data through different segments of a continuous, real time patient monitoring architecture. The architecture includes the insertion of data into a personal blockchain to facilitate data sharing amongst healthcare professionals and integration into electronic health records while ensuring privacy is maintained. The blockchain is customized for RPM with modifications that include having the PCA select a Miner to reduce computational effort, enabling the PCA to manage multiple blockchains for the same patient, and the modification of each block with a prefix tree to minimize energy consumption and incorporate secure transaction payments. Simulation results demonstrate that security and privacy can be enhanced in RPM with the PCA based End to End architecture.
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
Carry me if you can : A utility based forwarding scheme for content sharing in tourist destinations
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 22nd Asia-Pacific Conference on Communications, APCC 2016; Yogyakarta, Indonesia; 25th-27th August 2016 p. 261-267
- Full Text:
- Reviewed:
- Description: Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a tourist spot or camping site. In this study, we explore the message forwarding techniques in such environments considering the information that are readily available and can be gathered on the fly. We propose a utility based forwarding scheme to select the appropriate forwarder node based on co-location stay time, connectivity and available resources. A higher co-location stay time reflects that the forwarder and the destination node is likely to have more opportunistic contacts, while the connectivity and available resource ensure that the selected forwarder has sufficient neighbours and resources to carry the message forward. Simulation results suggest that the proposed approach attains high hit and success rate and low latency for successful content delivery, which is comparable to those proposed for work-place type scenarios with regular movement pattern and pre-existing relationships. © 2016 IEEE.
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 22nd Asia-Pacific Conference on Communications, APCC 2016; Yogyakarta, Indonesia; 25th-27th August 2016 p. 261-267
- Full Text:
- Reviewed:
- Description: Message forwarding is an integral part of the decentralized content sharing process as the content delivery success highly depends on it. Existing literature employs spatio-temporal regularity of human movement pattern and pre-existing social relationship to take message forwarding decisions. However, such approaches are ineffectual in environments where those information are unavailable such as a tourist spot or camping site. In this study, we explore the message forwarding techniques in such environments considering the information that are readily available and can be gathered on the fly. We propose a utility based forwarding scheme to select the appropriate forwarder node based on co-location stay time, connectivity and available resources. A higher co-location stay time reflects that the forwarder and the destination node is likely to have more opportunistic contacts, while the connectivity and available resource ensure that the selected forwarder has sufficient neighbours and resources to carry the message forward. Simulation results suggest that the proposed approach attains high hit and success rate and low latency for successful content delivery, which is comparable to those proposed for work-place type scenarios with regular movement pattern and pre-existing relationships. © 2016 IEEE.
Data exchange in delay tolerant networks using joint inter- and intra-flow network coding
- Ostovari, Pouya, Wu, Jie, Jolfaei, Alireza
- Authors: Ostovari, Pouya , Wu, Jie , Jolfaei, Alireza
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 37th IEEE International Performance Computing and Communications Conference, IPCCC 2018; Orlando, United States; 17th-19th November 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Data transmission in delay tolerant networks (DTNs) is a challenging problem due to the lack of continuous network connectivity and nondeterministic mobility of the nodes. Epidemic routing and spray-and-wait methods are two popular mechanisms that are proposed for DTNs. In order to reduce the transmission delay in DTNs, some previous works combine intra-flow network coding with the routing protocols. In this paper, we propose two routing mechanisms using systematic joint inter- and intra-flow network coding for the purpose of data exchange between the nodes. We discuss the reasons why inter-flow network coding helps to reduce the delivery delay of the packets, and we also analyze the delays related with only using intra-flow coding, and joint inter- and intra-flow coding methods. We empirically show the benefit of joint coding over just intra-flow coding. Based on our simulation, joint coding can reduce the delay up to 40%, compared to only intra-flow coding.
- Description: 2018 IEEE 37th International Performance Computing and Communications Conference, IPCCC 2018
- Authors: Ostovari, Pouya , Wu, Jie , Jolfaei, Alireza
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 37th IEEE International Performance Computing and Communications Conference, IPCCC 2018; Orlando, United States; 17th-19th November 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Data transmission in delay tolerant networks (DTNs) is a challenging problem due to the lack of continuous network connectivity and nondeterministic mobility of the nodes. Epidemic routing and spray-and-wait methods are two popular mechanisms that are proposed for DTNs. In order to reduce the transmission delay in DTNs, some previous works combine intra-flow network coding with the routing protocols. In this paper, we propose two routing mechanisms using systematic joint inter- and intra-flow network coding for the purpose of data exchange between the nodes. We discuss the reasons why inter-flow network coding helps to reduce the delivery delay of the packets, and we also analyze the delays related with only using intra-flow coding, and joint inter- and intra-flow coding methods. We empirically show the benefit of joint coding over just intra-flow coding. Based on our simulation, joint coding can reduce the delay up to 40%, compared to only intra-flow coding.
- Description: 2018 IEEE 37th International Performance Computing and Communications Conference, IPCCC 2018
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2016
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 11, no. 2 (2016), p. 235-246
- Full Text:
- Reviewed:
- Description: Permutation is a commonly used primitive in multimedia (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for the protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by a pseudo-random number generator. The literature on the cryptanalysis of image ciphers indicates that the permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosenplaintext attacks. However, the previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we revisited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutationonly image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a chosenplaintext attack. To the best of our knowledge, for the first time, this paper gives a chosen-plaintext attack that completely determines the correct plaintext elements using a deterministic method. When the plain-images are of size M × N and with L different color intensities, the number n of required chosen plain-images to break the permutation-only image encryption algorithm is n = logL(MN). The complexity of the proposed attack is O (n · M N) which indicates its feasibility in a polynomial amount of computation time. To validate the performance of the proposed chosen-plaintext attack, numerous experiments were performed on two recently proposed permutation-only image/video ciphers. Both theoretical and experimental results showed that the proposed attack outperforms the state-of-theart cryptanalytic methods.
Predicting and controlling the dynamics of infectious diseases
- Evans, Robin, Mammadov, Musa
- Authors: Evans, Robin , Mammadov, Musa
- Date: 2015
- Type: Text , Conference proceedings
- Relation: 54th IEEE Conference on Decision and Control, CDC 2015; Osaka, Japan; 15th-18th December 2015; Published in Proceedings of the IEEE Conference on Decision and Control; p. 5378-5383
- Full Text:
- Description: This paper introduces a new optimal control model to describe and control the dynamics of infectious diseases. In the present model, the average time to isolation (i.e. hospitalization) of infectious population is the main time-dependent parameter that defines the spread of infection. All the preventive measures aim to decrease the average time to isolation under given constraints. The model suggested allows one to generate a small number of possible future scenarios and to determine corresponding trajectories of infected population in different regions. Then, this information is used to find an optimal distribution of bed capabilities across countries/regions according to each scenario. © 2015 IEEE.
- Authors: Evans, Robin , Mammadov, Musa
- Date: 2015
- Type: Text , Conference proceedings
- Relation: 54th IEEE Conference on Decision and Control, CDC 2015; Osaka, Japan; 15th-18th December 2015; Published in Proceedings of the IEEE Conference on Decision and Control; p. 5378-5383
- Full Text:
- Description: This paper introduces a new optimal control model to describe and control the dynamics of infectious diseases. In the present model, the average time to isolation (i.e. hospitalization) of infectious population is the main time-dependent parameter that defines the spread of infection. All the preventive measures aim to decrease the average time to isolation under given constraints. The model suggested allows one to generate a small number of possible future scenarios and to determine corresponding trajectories of infected population in different regions. Then, this information is used to find an optimal distribution of bed capabilities across countries/regions according to each scenario. © 2015 IEEE.