Mobile Ad Hoc Networks (MANETs)

Mobile Ad Hoc Networks (MANETs) MANETs are made up of mobile devices that move in different directions at random speeds. These types of networks do not have any infrastructure and repeatedly configure themselves to connect with different devices in their communication...

Bayesian Statistics

Bayesian Statistics A hypothesis is nothing more than a claim or premise that one is interested in verifying. In imaging and spectroscopy, one example is that at a certain location in the eld of view, the hypothesis is that a spectrum is present. Another hypothesis is...

Mobile Power Management

Mobile Power Management Improving energy efficiency in mobiles is very challenging due to variable workload, environmental conditions and user experience requirements. A solution is represented by Dynamic Power Management (DPM), which adapts operating conditions at...

Mobile Devices and User Experience

Mobile Devices and User Experience Providing quality user experience is the main goal of mobile devices . This depends on how quality is perceived by users. Quality user experience is achieved when the device behavior meets user’s expectations. User’s perception is...

Difference Between Solar And Wind Energy

Difference Between Solar And Wind Energy Solar and wind energy have some common features. Both of them are considered renewable energy, both of them are stochastic, and some energy forecast methods work for both of them. Since this research is focusing on solar power,...

Existing Problem in Wireless Sensor Networks

Existing Problem in Wireless Sensor Networks There are two types of nodes in a Wireless Sensor Network (WSN); normal-behaved and transfaulty. A normal-behaved node can sense all the surrounding data and send them successfully to its neighboring node. A transfaulty...

ICS Communication Architecture and Modbus Communications

ICS Communication Architecture and Modbus Communications Modbus is a serial based communications protocol that was initially published by Modicon (Schneider Electric) in 1979 to be used with PLCs. It is robust and simple and is known as the de facto standard protocol...

Combined Cyber-physical attacks

Combined Cyber-physical attacks Addressing the issue of combined cyber-physical on the grid attacks is an ongoing effort in between the private and public sectors. Cyber-physical attacks, also known as blended attacks, are executed by an attacker or by inadvertent...

Smart Grid

Smart Grid A “Smart grid” refers to the class of technology being used to modernize electrical power systems by employing computer-based automation and remote control devices. These systems operate by using bi-directional communication technology and computerized...

supervisory control and data acquisition ( SCADA )

 supervisory control and data acquisition ( SCADA ) SCADA systems are utilized to control geographically dispersed assets whenever centralized data acquisition is as essential as control. SCADA systems are ideal for distribution systems such as oil and gas, water...

Overview of Industrial Control Systems

Overview of Industrial Control Systems The term industrial control system (ICS) encompasses numerous types of control systems, such as distributed control systems (DCS), supervisory control and data acquisition (SCADA) systems, as well as programmable logic...

DYNAMIC SECURITY ASSESSMENT SYSTEM

Introduction to the Dynamic Security Assessment System DSA system plays an important role in power system control room for operational decision making and remedial control processes. The computational framework for current practice of DSA system includes two stages,...

Requirements of a successful electrical power service

Requirements of a successful electrical power service Electric power has become a major portion of energy supply all over the world after industrial revolution. As the major power supply to a wide range of customers, the qualification of power systems operation has a...