4 results

Analysis of integration of multi-terminal HVDC network to weak grids.

Presentation / Conference
Givaki, K., Rahman, M. H., Vozikis, D., & Giveki, A. (2018, June)
Analysis of integration of multi-terminal HVDC network to weak grids. Paper presented at The 14th IET International Conference on AC and DC Power Transmission (ACDC 2018), Chengdu, China
In this paper, the integration of multi-terminal HVDC systems to weak power grids is analysed under different grid strengths and control methods. In this paper, a modular mult...

Performance evaluation of RPL objective functions.

Presentation / Conference
Altwassi, H., Qasem, M., Yassein, M. B., & Al-Dubai, A. (2015, October)
Performance evaluation of RPL objective functions. Paper presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Future Trends in conjunction with the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, UK
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Ra...

Inspired counter based broadcasting in dynamic source routing protocol.

Presentation / Conference
Yassein, M. B., & Al-Dubai, A. (2015, October)
Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015), Liverpool, UUK
The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of rela...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...