American Journal of Electrical and Computer Engineering

Archive

Volume 1, Issue 1, June 2017

  • Construction and Continuous Processing of Programs with Determinate-Connected Modules

    Evgeniy Bryndin

    Issue: Volume 1, Issue 1, June 2017
    Pages: 1-8
    Received: Jan. 29, 2017
    Accepted: Feb. 28, 2017
    Published: Mar. 15, 2017
    DOI: 10.11648/j.ajece.20170101.11
    Downloads:
    Views:
    Abstract: Continuous processing of large volumes of information on virtual computer memory was considered as technically not realized. This problem is not technical, but algorithmic. In article the solution of this problem is considered: creation of programs with the determinate-connected modules; structure of the supercomputer for continuous processing of p... Show More
  • A Multi Agent Scheme and Optimization for Big Data Management of Sensor Networks in Smart City Management

    Hui Xie, Shan Jiao, Yaqian Wang, Zhengying Cai

    Issue: Volume 1, Issue 1, June 2017
    Pages: 9-17
    Received: Mar. 15, 2017
    Accepted: Mar. 29, 2017
    Published: May 15, 2017
    DOI: 10.11648/j.ajece.20170101.12
    Downloads:
    Views:
    Abstract: Because of complex sensor networks in smart city management, it is very difficult to optimize the data processing from all kinds of sensors. Here a multi-agent system (MAS) is made for data processing and optimization of sensor networks in smart city management. First, the sensor network in smart city management is modeled as a self-organized and d... Show More
  • Load Curtailment Sensitivity Indices Through Optimal Placement of Unified Power Flow Controller

    Kyaw Myo Lin

    Issue: Volume 1, Issue 1, June 2017
    Pages: 18-24
    Received: Mar. 11, 2017
    Accepted: Apr. 08, 2017
    Published: May 18, 2017
    DOI: 10.11648/j.ajece.20170101.13
    Downloads:
    Views:
    Abstract: The optimal power flow (OPF) is one of the key tasks to be performed in the complicated operation and planning of a power system. Directing the power in such a way that the lightly loaded branches are loaded to reduce the system load curtailment is an option which can be achieved by making use of FACTS devices. This paper proposes a set of load cur... Show More
  • Design and Construction of an Automatic Home Security System Based on GSM Technology and Embedded Microcontroller Unit

    Iyapo Kamoru Olarewaju, Odo Ekundare Ayodele, Fasunla Olukayode Michael, Egbuwalo Shadrack Alaba, Raimi Oluwole Abiodun

    Issue: Volume 1, Issue 1, June 2017
    Pages: 25-32
    Received: Mar. 16, 2017
    Accepted: Apr. 11, 2017
    Published: May 18, 2017
    DOI: 10.11648/j.ajece.20170101.14
    Downloads:
    Views:
    Abstract: In wake of the number of burglar incidences rising in different states in Nigeria, and the lack of an efficient state security agency, there has been a focus on the deployment of home security/alarm systems, sponsored by different privately own security outfit in other to combat the high level of crime. With the advancement in technology particular... Show More
  • A Hybrid Honeypot Scheme for Distributed Denial of Service Attack

    Hazem Sallowm, Mohammed Assora, Mohammed Alchaita, Mohamad Aljnidi

    Issue: Volume 1, Issue 1, June 2017
    Pages: 33-39
    Received: Mar. 12, 2017
    Accepted: Apr. 06, 2017
    Published: May 24, 2017
    DOI: 10.11648/j.ajece.20170101.15
    Downloads:
    Views:
    Abstract: The main challenge in network security is keeping up with all threat types that arise every day. Traditional security mechanisms such as firewalls and Intrusion Detection System (IDS) do not provide detection for new attacks or helping in learning new attackers’ techniques. This paper presents a hybrid honeypot scheme that combines low and high int... Show More
  • Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network

    Firas Masoud, Mohammad Alchaita, Mohammad Assora

    Issue: Volume 1, Issue 1, June 2017
    Pages: 40-49
    Received: Mar. 11, 2017
    Accepted: Apr. 14, 2017
    Published: May 26, 2017
    DOI: 10.11648/j.ajece.20170101.16
    Downloads:
    Views:
    Abstract: Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this con... Show More