31 Slices
Medium 9781601323231

Identification of Compromised Power System State Variables

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Information and Knowledge Engineering | IKE'14 |

83

Identification of Compromised Power System State Variables

Nathan Wallace, Stainislav Ponomarev, and Travis Atkison

Deptartments of Electrical Engineering, Cyber Engineering, and Computer Science,

Louisiana Tech University, Ruston, LA, United States

Abstract— Securing the critical infrastructure power grid is one of the biggest challenges in securing cyberspace. In this environment, control devices are spread across large geographic distances and utilize several mediums for communication. Given the required network topology of the power grid several entry points may exist that can be utilized for compromising a control network. This article explores a cyber event detection scheme based on the Grubbs’ test to classify univariate values. The test is conducted only after a power system instance has been classified as containing a cyber-event. The classification of each instance is made via principal component analysis and the Hoteling’s T2 value.

See All Chapters
Medium 9781601323231

Session Data and Information Mining + Forecasting Methods + Simulation + Crowd-Sourcing

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF
Medium 9781601323231

The Use of Merging Algorithm to Real Ranking for Graph Search

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

62

Int'l Conf. Information and Knowledge Engineering | IKE'14 |

The Use of Merging Algorithm to Real Ranking for Graph Search

A. Mohammad Reza Nami , B. Mehdi Ebadian

Faculty of Electrical, Computer, and IT Engineering,

Islamic Azad University- Qazvin Branch, Qazvin, IRAN

ABSTRACT

Ranking problem is becoming an important issue in many fields, especially in information retrieval. This paper presents an automatic technique for spam monitoring in the graph. The technique is based on combining information from two different sources:

Truncated page rank and Semi-Streaming Graph

Algorithms. In this paper we conduct further study on the heuristically ranking framework and provide measuring page rank of link farm. Twenty-six articles from 15 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of Information Retrieval.

Keywords

Information retrieval (IR), Page rank (PR), Streaming

Algorithms, Internet Marketing, Spam and Search

Engine Optimization.

See All Chapters
Medium 9781601323231

Content Management in Digital Libraries

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

���

�� �� ���

2�� ����� �� ����

� �������" ��

3��� �"�� �� ����� ������ ��

�"� +��

�� ,���

#�������� ��� ����� �� �"�

��� ��������

� 5�������� ��� �����

� ��������

��� �

����"�� ����

����� ��� ������ ��������� �������� 1"�

��� �����

� �� �

��� �

"��� ���

������ �������� �� ���� �

�������� �����" ��� ������ �

����� ����������7 �� ���

���

� �

�"� ������

� �

��� ����

�! 1"�� 5�� ��� �����

�� ��!� � ����

����� ��� ���������� ���� ��

����� �� �"�

�������� ���� �� � �� 2���

1"� ����� �� ���������� ��

��4 �� #����

� 1�

�� �������

��

������� ��

�� �"� �����

�"� ��� ��� �� #����

� 1"��� ��

��

��

�� ����

��" �

�� �������

�3���� ����������

�����

� �

���

�� ��� �

��

���� ��� ���� �� #����

� 8

��

�� ������� �"� ���� ����� ��� #����

� 8��� ��� ���� �"�

�� ���

� ��� ����

���� ��

�� �"� ������ ��

���

�"�

�!

�������� ��

� ���� ����������� �

���

�� ��� �����

��

���� ��� ����� ���

��� �� ������� ���������

#

!

"�����������

��� ��� �������� �

�! ����������� �� ��� �� �"� ����

See All Chapters
Medium 9781601323231

Multi-Projects Scheduling Via Non-cooperative Agents Through Heterogeneous Multiprocessor Systems For Energy Efficiency

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Information and Knowledge Engineering | IKE'14 |

73

Multi-Projects Scheduling Via Non-cooperative Agents Through Heterogeneous Multiprocessor Systems For

Energy Efficiency

Marjan Abdeyazdan1, Mohammad Reza Moini2

1

Department of Computer Engineering, College of Electricity and Computer, Mahshahr branch, Islamic Azad

University, Mahshahr, Iran. e-mail: abdeyazdan87@yahoo.com , m.abdeyazdan@mahshahriau.ac.ir

2

Department of Computer Engineering, College of Electricity and Computer, Mahshahr branch, Islamic Azad

University, Mahshahr, Iran.

e-mail: rezamoini_it@yahoo.com

Abstract. Multiprocessor systems started a revolution in high performance computing that brought about fundamental changes in computation.

This article examines scheduling of multiprojects, in which each project is assumed as an agent.

Scheduling is done by assignment of agents to homogeneous and heterogeneous processors in parallel where every agent is comprised of some tasks and the related tasks in each agent constitute task graphs. Every agent has one initial point and a final point. To go from the initial point to the final point, there are some strategies, namely, various scenarios, which are selected based on the two objectives of minimizing energy consumption

See All Chapters

See All Slices