Shahrazad, M., Zobaa, A., Optimal Allocation of FACTS Devices in Distribution Networks Using Imperialist Competitive Algorithm, (2013) International Review of Electrical Engineering (IREE), 8 (5), pp. Nayak, M., Nayak, C., Distributed Generation Optimal Placement and Sizing to Enhance Power Distribution Network Performance Using MTLBO, (2013) International Review of Electrical Engineering (IREE), 8 (6), pp. Kumar, R., Thanushkodi, K., Reconfiguration and Capacitor Placement Using Opposition Based Differential Evolution Algorithm in Power Distribution System, (2013) International Review on Modelling and Simulations (IREMOS), 6 (4), pp. Nayak, M., Kasturi, K., Rout, P., Optimal Placement and Sizing of Multiple Capacitors in Radial Distribution Systems Using Modified TLBO Algorithm, (2013) International Review of Automatic Control (IREACO), 6 (6), pp.
Syai’in, M., Lian, K., Soeprijanto, A., Digital Generator Capability Curve for Improving Optimal Power Flow based on IPSO, (2013) International Review of Electrical Engineering (IREE), 8 (2), pp. 44-50.Įnshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp.
Smirnov, Y., Halimon, V., Double Layer Gateway Model for Connection Between Production Network and Enterprise Network, (2015) International Review of Automatic Control (IREACO), 8 (1), pp. The developer can make the necessary changes. Rebecca Bace, Peter Mell, NIST Special Publication on Intrusion Detection Systems (Infidel, Inc., Scotts Valley, CA - National Institute of Standards and Technology, 2003).ĭavid Burgermeister, Jonathan Krier, les systèmes de détection d’intrusions (, 2006).Ĭiapessoni, E., Cirio, D., Massucco, S., Pitto, A., Silvestro, F., Risk-Based Security and Control Framework for Power System Operation Under Significant Amounts of HVDC-connected Wind Power Generation, (2015) International Review of Electrical Engineering (IREE), 10 (3), pp. This Arduino Simulator app gives the user the freedom to work without the basic setup of hardware and software.
Y.SENHAJI, H.MEDROMI, Network Security: Software IDS versus Embedded IDS, International Journal of Emerging Trends & Technology in Computer Science (Volume 4, Issue 4, July-August 2015 ISBN: 2278-6856).īoriana Ditcheva, Lisa Fowler, Signature-based Intrusion Detection (University of North Carolina at Chapel Hill, 2005). WINPCAP, Winpcap documentation (Politecnico di Torino Dsfg, 2002-2005). US Departement of Commerce, 2007).Īdam Hils, Greg Young, Jeremy D'Hoinne, Magic Quadrant for Intrusion Prevention Systems (, December 2013). Ive installed an Arduino Ethernet in the engine room, used a hall sensor to.
The values and behaviors obtained with Professor Techno are given as examples and do not claim to fully reproduce reality.Karen Scarfone, Peter Mell, Guide to Intrusion Detection and Prevention Systems IDPS (NIST. realdash raspberry pi Test RealDash virtual dashboard on Android Raspberry. Same sketch and schematic can show a different behaviour between ProfessorTechno and handling with an Arduino Uno board. The application is either available in French or English. #As the tool is designed for young students Library/Sketch/Schematic are displayed on the same screen (on 10"), no need to use several tools or screens# (Next release line follower robot simulator) PROFESSORTECHNO can be used by students(at school/home) in several ways: ARDUBLOCK can be downloaded () and added to the ARDUINO IDE as a tool. ProfessorTechno uses a simplified version and freely inspired of ARDUBLOCK (visual programming of ARDUINO). The 1st "simulator" of ARDUINO UNO designed for young students AND beginners. Please visit my website before rating and send me an email for any questions!!!!!