Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (103)

Search Parameters:
Keywords = Internet router

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 7440 KB  
Article
Buffer with Dropping Function and Correlated Packet Lengths
by Andrzej Chydzinski and Blazej Adamczyk
Appl. Syst. Innov. 2025, 8(5), 135; https://doi.org/10.3390/asi8050135 - 19 Sep 2025
Viewed by 698
Abstract
We analyze a model of the packet buffer in which a new packet can be discarded with a probability connected to the buffer occupancy through an arbitrary dropping function. Crucially, it is assumed that packet lengths can be correlated in any way and [...] Read more.
We analyze a model of the packet buffer in which a new packet can be discarded with a probability connected to the buffer occupancy through an arbitrary dropping function. Crucially, it is assumed that packet lengths can be correlated in any way and that the interarrival time has a general distribution. From an engineering perspective, such a model constitutes a generalization of many active buffer management algorithms proposed for Internet routers. From a theoretical perspective, it generalizes a class of finite-buffer models with the tail-drop discarding policy. The contributions include formulae for the distribution of buffer occupancy and the average buffer occupancy, at arbitrary times and also in steady state. The formulae are illustrated with numerical calculations performed for various dropping functions. The formulae are also validated via discrete-event simulations. Full article
(This article belongs to the Section Applied Mathematics)
Show Figures

Figure 1

16 pages, 955 KB  
Article
Minimizing Redundant Hash and Witness Operations in Merkle Hash Trees
by DaeYoub Kim
Appl. Sci. 2025, 15(17), 9611; https://doi.org/10.3390/app15179611 - 31 Aug 2025
Viewed by 776
Abstract
Reusing cached data is a widely adopted technique for improving network and system performance. Future Internet architectures such as Named Data Networking (NDN) leverage intermediate nodes—such as proxy servers and routers—to cache and deliver data, reducing latency and alleviating load on original data [...] Read more.
Reusing cached data is a widely adopted technique for improving network and system performance. Future Internet architectures such as Named Data Networking (NDN) leverage intermediate nodes—such as proxy servers and routers—to cache and deliver data, reducing latency and alleviating load on original data sources. However, a fundamental challenge of this approach is the lack of trust in intermediate nodes, as users cannot reliably identify and verify them. To address this issue, many systems adopt data-oriented verification rather than sender authentication, using Merkle Hash Trees (MHTs) to enable users to verify both the integrity and authenticity of received data. Despite its advantages, MHT-based authentication incurs significant redundancy: identical hash values are often recomputed, and witness data are repeatedly transmitted for each segment. These redundancies lead to increased computational and communication overhead, particularly in large-scale data publishing scenarios. This paper proposes a novel scheme to reduce such inefficiencies by enabling the reuse of previously verified node values, especially transmitted witnesses. The proposed scheme improves both computational and transmission efficiency by eliminating redundant computation arising from repeated calculation of identical node values. To achieve this, it stores and reuses received witness values. As a result, when verifying 2n segments (n > 8), the proposed method achieves more than an 80% reduction in total hash operations compared to the standard MHT. Moreover, our method preserves the security guarantees of the MHT while significantly optimizing its performance in terms of both computation and transmission costs. Full article
Show Figures

Figure 1

19 pages, 2268 KB  
Article
Toward the Implementation of Text-Based Web Page Classification and Filtering Solution for Low-Resource Home Routers Using a Machine Learning Approach
by Audronė Janavičiūtė, Agnius Liutkevičius and Nerijus Morkevičius
Electronics 2025, 14(16), 3280; https://doi.org/10.3390/electronics14163280 - 18 Aug 2025
Viewed by 730
Abstract
Restricting and filtering harmful content on the Internet is a serious problem that is often addressed even at the state and legislative levels. Existing solutions for restricting and filtering online content are usually installed on end-user devices and are easily circumvented and difficult [...] Read more.
Restricting and filtering harmful content on the Internet is a serious problem that is often addressed even at the state and legislative levels. Existing solutions for restricting and filtering online content are usually installed on end-user devices and are easily circumvented and difficult to adapt to larger groups of users with different filtering needs. To mitigate this problem, this study proposed a model of a web page classification and filtering solution suitable for use on home routers or other low-resource web page filtering devices. The proposed system combines the constantly updated web page category list approach with machine learning-based text classification methods. Unlike existing web page filtering solutions, such an approach does not require additional software on the client-side, is more difficult to circumvent for ordinary users and can be implemented using common low-resource routers intended for home and organizations usage. This study evaluated the feasibility of the proposed solution by creating the less resource-demanding implementations of machine learning-based web page classification methods adapted for low-resource home routers that could be used to classify and filter unwanted Internet pages in real-time based on the text of the page. The experimental evaluation of softmax regression, decision tree, random forest, and linear SVM (support vector machine) machine learning methods implemented in the C/C++ programming language was performed using a commercial home router Asus RT-AC85P with 256 MB RAM (random access memory) and MediaTek MT7621AT 880 MHz CPU (central processing unit). The implementation of the linear SVM classifier demonstrated the best accuracy of 0.9198 and required 1.86 s to process a web page. The random forest model was only slightly faster (1.56 s to process a web page), while its accuracy reached only 0.7879. Full article
Show Figures

Figure 1

37 pages, 4400 KB  
Article
Optimizing Weighted Fair Queuing with Deep Reinforcement Learning for Dynamic Bandwidth Allocation
by Mays A. Mawlood and Dhari Ali Mahmood
Telecom 2025, 6(3), 46; https://doi.org/10.3390/telecom6030046 - 1 Jul 2025
Viewed by 1927
Abstract
The rapid growth of high-quality telecommunications demands enhanced queueing system performance. Traditional bandwidth distribution often struggles to adapt to dynamic changes, network conditions, and erratic traffic patterns. Internet traffic fluctuates over time, causing resource underutilization. To address these challenges, this paper proposes a [...] Read more.
The rapid growth of high-quality telecommunications demands enhanced queueing system performance. Traditional bandwidth distribution often struggles to adapt to dynamic changes, network conditions, and erratic traffic patterns. Internet traffic fluctuates over time, causing resource underutilization. To address these challenges, this paper proposes a new adaptive algorithm called Weighted Fair Queues continual Deep Reinforcement Learning (WFQ continual-DRL), which integrates the advanced deep reinforcement learning Soft Actor-Critic (SAC) algorithm with the Elastic Weight Consolidation (EWC) approach. This technique is designed to overcome neural networks’ catastrophic forgetting, thereby enhancing network routers’ dynamic bandwidth allocation. The agent is trained to allocate bandwidth weights for multiple queues dynamically by interacting with the environment to observe queue lengths. The performance of the proposed adaptive algorithm was evaluated for eight queues until it expanded to twelve-queue systems. The model achieved higher cumulative rewards as compared to previous studies, indicating improved overall performance. The values of the Mean Squared Error (MSE) and Mean Absolute Error (MAE) decreased, suggesting effectively optimized bandwidth allocation. Reducing Root Mean Square Error (RMSE) indicated improved prediction accuracy and enhanced fairness computed by Jain’s index. The proposed algorithm was validated by employing real-world network traffic data, ensuring a robust model under dynamic queuing requirements. Full article
Show Figures

Figure 1

29 pages, 662 KB  
Article
Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques
by Hosam Alamleh, Laura Estremera, Shadman Sakib Arnob and Ali Abdullah S. AlQahtani
J. Cybersecur. Priv. 2025, 5(2), 27; https://doi.org/10.3390/jcp5020027 - 22 May 2025
Cited by 1 | Viewed by 4391
Abstract
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for [...] Read more.
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for adversaries—especially Advanced Persistent Threats (APTs), which operate with high levels of sophistication, resources, and long-term strategic objectives. This paper provides a holistic security analysis of WLANs under the lens of APT threat models, categorizing APT actors by capability tiers and examining their ability to compromise WLANs through logical attack surfaces. The study identifies and explores three primary attack surfaces: Radio Access Control interfaces, compromised insider nodes, and ISP gateway-level exposures. A series of empirical experiments—ranging from traffic analysis of ISP-controlled routers to offline password attack modeling—evaluate the current resilience of WLANs and highlight specific vulnerabilities such as credential reuse, firmware-based leakage, and protocol downgrade attacks. Furthermore, the paper demonstrates how APT resources significantly accelerate attacks through formal models of computational scaling. It also incorporates threat modeling frameworks, including STRIDE and MITRE ATT&CK, to contextualize risks and map adversary tactics. Based on these insights, this paper offers practical recommendations for enhancing WLAN resilience through improved authentication mechanisms, network segmentation, AI-based anomaly detection, and open firmware adoption. The findings underscore that while current WLAN implementations offer basic protections, they remain highly susceptible to well-resourced adversaries, necessitating a shift toward more robust, context-aware security architectures. Full article
Show Figures

Figure 1

20 pages, 2304 KB  
Article
Resilient Topology Reconfiguration for Industrial Internet of Things: A Feature-Driven Approach Against Heterogeneous Attacks
by Tianyu Wang, Dong Li, Bowen Zhang, Xianda Liu and Wenli Shang
Entropy 2025, 27(5), 503; https://doi.org/10.3390/e27050503 - 7 May 2025
Cited by 1 | Viewed by 893
Abstract
This paper proposes a feature-driven topology reconfiguration framework to enhance the resilience of Industrial Internet of Things (IIoT) systems against heterogeneous attacks. By dynamically partitioning IIoT into subnetworks based on localized attack features and reconstructing each subnetwork with tailored topologies, our framework significantly [...] Read more.
This paper proposes a feature-driven topology reconfiguration framework to enhance the resilience of Industrial Internet of Things (IIoT) systems against heterogeneous attacks. By dynamically partitioning IIoT into subnetworks based on localized attack features and reconstructing each subnetwork with tailored topologies, our framework significantly improves connectivity and communication efficiency. Evaluations on a real-world dataset (Tech-Routers-RF) characterizing IIoT topologies with 2113 nodes show that under diverse attack scenarios, connectivity and communication efficiency improve by more than 70% and 50%, respectively. Leveraging information entropy to quantify the trade-off between structural diversity and connection predictability, our work bridges adaptive network design with real-world attack dynamics, offering a scalable solution for securing large-scale IIoT deployments. Full article
(This article belongs to the Special Issue Spreading Dynamics in Complex Networks)
Show Figures

Figure 1

25 pages, 2501 KB  
Article
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
by Cong Wang, Haoyu Wu, Yulong Gan, Rui Zhang and Maode Ma
Entropy 2025, 27(5), 471; https://doi.org/10.3390/e27050471 - 26 Apr 2025
Viewed by 981
Abstract
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate [...] Read more.
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate management and computationally intensive bilinear pairings under traditional Public Key Infrastructure (PKI), while NDN routers require low-latency batch verification for high-speed data forwarding. To address these issues, this study proposes ECAE, an efficient certificateless aggregate signature scheme based on elliptic curve cryptography (ECC). ECAE introduces a partial private key distribution mechanism in key generation, enabling the authentication of identity by a Key Generation Center (KGC) for terminal devices. It leverages ECC and universal hash functions to construct an aggregate verification model that eliminates bilinear pairing operations and reduces communication overhead. Security analysis formally proves that ECAE resists forgery, replay, and man-in-the-middle attacks under the random oracle model. Experimental results demonstrate substantial efficiency gains: total computation overhead is reduced by up to 46.18%, and communication overhead is reduced by 55.56% compared to state-of-the-art schemes. This lightweight yet robust framework offers a trusted and scalable verification solution for NDN-IoT environments. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

22 pages, 15716 KB  
Article
Research on the Design and Application of Multi-Port Energy Routers
by Xianping Zhu, Weibo Li, Kangzheng Huang, Shuai Cao, Boyu Lin, Rentai Li and Wei Xu
Energies 2025, 18(4), 866; https://doi.org/10.3390/en18040866 - 12 Feb 2025
Viewed by 1206
Abstract
At present, the development of the global energy internet is occurring in depth and the construction of a distributed power supply is rapid, and the energy router (ER), as a key device for integrating energy flow and information flow, has important application value [...] Read more.
At present, the development of the global energy internet is occurring in depth and the construction of a distributed power supply is rapid, and the energy router (ER), as a key device for integrating energy flow and information flow, has important application value in microgrids. In this paper, a multi-port energy router based on a 710 V DC bus is designed and developed with a modular structure design, including core components such as a total controller, a power converter, a hybrid energy storage system, and an auxiliary power supply. Flexible access and the management of multiple-voltage-level ports (690 V AC, 380 V AC, 220 V DC, and 24 V DC) are realized through rational topology design. The test results of the device show that the system performance indexes meet the design requirements. The operation is stable and reliable, displaying strong practical engineering value, and at the same time provides a technical solution that can be borrowed for other special scenarios such as the microgrid system. Full article
(This article belongs to the Special Issue Advancements in Power Electronics for Power System Applications)
Show Figures

Figure 1

24 pages, 11264 KB  
Article
Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT)
by Nemat Hazrati, Sajjad Pirahesh, Bahman Arasteh, Seyed Salar Sefati, Octavian Fratu and Simona Halunga
Future Internet 2025, 17(1), 11; https://doi.org/10.3390/fi17010011 - 1 Jan 2025
Cited by 3 | Viewed by 2395
Abstract
Information-centric networking (ICN) changes the way data are accessed by focusing on the content rather than the location of devices. In this model, each piece of data has a unique name, making it accessible directly by name. This approach suits the Internet of [...] Read more.
Information-centric networking (ICN) changes the way data are accessed by focusing on the content rather than the location of devices. In this model, each piece of data has a unique name, making it accessible directly by name. This approach suits the Internet of Things (IoT), where data generation and real-time processing are fundamental. Traditional host-based communication methods are less efficient for the IoT, making ICN a better fit. A key advantage of ICN is in-network caching, which temporarily stores data across various points in the network. This caching improves data access speed, minimizes retrieval time, and reduces overall network traffic by making frequently accessed data readily available. However, IoT systems involve constantly updating data, which requires managing data freshness while also ensuring their validity and processing accuracy. The interactions with cached data, such as updates, validations, and replacements, are crucial in optimizing system performance. This research introduces an ICN-IoT method to manage and process data freshness in ICN for the IoT. It optimizes network traffic by sharing only the most current and valid data, reducing unnecessary transfers. Routers in this model calculate data freshness, assess its validity, and perform cache updates based on these metrics. Simulation results across four models show that this method enhances cache hit ratios, reduces traffic load, and improves retrieval delays, outperforming similar methods. The proposed method uses an artificial neural network to make predictions. These predictions closely match the actual values, with a low error margin of 0.0121. This precision highlights its effectiveness in maintaining data currentness and validity while reducing network overhead. Full article
Show Figures

Figure 1

29 pages, 8710 KB  
Article
Design of Hybrid Topology Wireless Sensor Network Nodes Based on ZigBee Protocol
by Haorun Lv, Lina Liu, Juanjuan Li, Yi Xu and Yan Sheng
Electronics 2025, 14(1), 115; https://doi.org/10.3390/electronics14010115 - 30 Dec 2024
Cited by 6 | Viewed by 1857
Abstract
With the rapid development of wireless communication and embedded technology, wireless sensor networks (WSNs) have become an important part of the Internet of Things (IoT). Despite these advances, many current WSNs are still limited to a single topology and point-to-point communication, which greatly [...] Read more.
With the rapid development of wireless communication and embedded technology, wireless sensor networks (WSNs) have become an important part of the Internet of Things (IoT). Despite these advances, many current WSNs are still limited to a single topology and point-to-point communication, which greatly hinders communication efficiency and scalability and poses additional challenges for our communication networks. In this study, we propose a multi-node hybrid-topology sensor network that uses the CC2530 chip and ZigBee technology to overcome these problems. Single-structure wireless sensor networks have problems such as poor scalability, and damage to a terminal can cause the entire network to collapse. To solve these problems, we propose a new hybrid-topology model with the advantages of scalability and system stability. It also has a self-regulating mechanism, so that if a router is damaged, the terminal can be converted to a router to prevent the network from collapsing. We propose a new hybrid topology model using ZigBee wireless communication technology and the CC2530 chip. The aim of this research is to improve communication efficiency, reduce costs, and achieve high accuracy while meeting energy-saving requirements and measurement needs in a variety of environments. Finally, we studied the model’s scalability to further illustrate its superiority in the development of wireless sensor networks. The experimental results show that this method not only improves communication efficiency but also achieves flexibility. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

14 pages, 4252 KB  
Article
Vector Reconfiguration on a Bidirectional Multilevel LCL-T Resonant Converter
by Jie Shi, Zhongyi Zhang, Yi Xu, Dandan Zou and Hui Cao
Electronics 2024, 13(22), 4557; https://doi.org/10.3390/electronics13224557 - 20 Nov 2024
Viewed by 774
Abstract
With the development of distributed energy technology, the establishment of the energy internet has become a general trend, and relevant research about the core component, energy router, has also become a hotspot. Therefore, the bidirectional isolated DC–DC converter (BIDC) is widely used in [...] Read more.
With the development of distributed energy technology, the establishment of the energy internet has become a general trend, and relevant research about the core component, energy router, has also become a hotspot. Therefore, the bidirectional isolated DC–DC converter (BIDC) is widely used in AC–DC–AC energy router systems, because it can flexibly support the DC bus voltage ratio and achieve bidirectional power flow. This paper proposes a novel vector reconfiguration on a bidirectional multilevel LCL-T resonant converter in which an NPC (neutral-point clamped) multilevel structure with a flying capacitor is introduced to form a novel active bridge, and a coupling transformer is specially added into the active bridge to achieve multilevel voltage output under hybrid modulation. In addition, an LCL-T two-port vector analysis is adopted to elaborate bidirectional power flow which can generate some reactive power to realize zero-voltage switching (ZVS) on active bridges to improve the efficiency of the converter. Meanwhile, due to the symmetry of the LCL-T structure, the difficulty of the bidirectional operation analysis of the power flow is reduced. Finally, a simulation study is designed with a rated voltage of 200 V on front and rear input sources which has a rated power of 450 W with an operational efficiency of 93.8%. Then, the feasibility of the proposed converter is verified. Full article
Show Figures

Figure 1

27 pages, 33375 KB  
Article
Worker Presence Monitoring in Complex Workplaces Using BLE Beacon-Assisted Multi-Hop IoT Networks Powered by ESP-NOW
by Raihan Uddin, Taewoong Hwang and Insoo Koo
Electronics 2024, 13(21), 4201; https://doi.org/10.3390/electronics13214201 - 26 Oct 2024
Cited by 2 | Viewed by 2378
Abstract
The increasing adoption of Internet of Things (IoT) technologies has facilitated the creation of advanced applications in various industries, notably in complex workplaces where safety and efficiency are paramount. This paper addresses the challenge of monitoring worker presence in vast workplaces such as [...] Read more.
The increasing adoption of Internet of Things (IoT) technologies has facilitated the creation of advanced applications in various industries, notably in complex workplaces where safety and efficiency are paramount. This paper addresses the challenge of monitoring worker presence in vast workplaces such as shipyards, large factories, warehouses, and other construction sites due to a lack of traditional network infrastructure. In this context, we developed a novel system integrating Bluetooth Low Energy (BLE) beacons with multi-hop IoT networks by using the ESP-NOW communications protocol, first introduced by Espressif Systems in 2017 as part of its ESP8266 and ESP32 platforms. ESP-NOW is designed for peer-to-peer communication between devices without the need for a WiFi router, making it ideal for environments where traditional network infrastructure is limited or nonexistent. By leveraging the BLE beacons, the system provides real-time presence data of workers to enhance safety protocols. ESP-NOW, a low-power communications protocol, enables efficient, low-latency communication across extended ranges, making it suitable for complex environments. Utilizing ESP-NOW, the multi-hop IoT network architecture ensures extensive coverage by deploying multiple relay nodes to transmit data across large areas without Internet connectivity, effectively overcoming the spatial challenges of complex workplaces. In addition, the Message Queuing Telemetry Transport (MQTT) protocol is used for robust and efficient data transmission, connecting edge devices to a central Node-RED server for real-time remote monitoring. Moreover, experimental results demonstrate the system’s ability to maintain robust communication with minimal latency and zero packet loss, enhancing worker safety and operational efficiency in large, complex environments. Furthermore, the developed system enhances worker safety by enabling immediate identification during emergencies and by proactively identifying hazardous situations to prevent accidents. Full article
Show Figures

Figure 1

24 pages, 1324 KB  
Article
A Method for Quantifying Global Network Topology Based on a Mathematical Model
by Jinyu Zhu, Yu Zhang, Yunan Wang, Hongli Zhang and Binxing Fang
Mathematics 2024, 12(19), 3114; https://doi.org/10.3390/math12193114 - 4 Oct 2024
Cited by 1 | Viewed by 1741
Abstract
To facilitate a direct comparison of the differences in network resources among countries worldwide, this paper proposes a method for quantifying the relationship between autonomous systems and territorial networks from the perspective of network topology. Using global router-level network topology data as the [...] Read more.
To facilitate a direct comparison of the differences in network resources among countries worldwide, this paper proposes a method for quantifying the relationship between autonomous systems and territorial networks from the perspective of network topology. Using global router-level network topology data as the foundational data for the network resources of various countries, we abstract the dual mapping information of router geographic distribution and operational ownership into a matrix-form mathematical model. By employing relevant indicators from both network scale and border connectivity, we compare matrix model data from different periods to quantitatively assess changes in the network structures of countries globally. The study results show that internet resources are concentrated in the United States, which owns 38.04% of the global routers, distributed across 87.88% of the countries, significantly impacting the global network. Compared to the average quantitative indicators of each country, 67.00% of the countries exhibit higher deployment consistency, 37.30% show higher border connection consistency, 23.81% perform prominently in terms of impact, and 46.20% have outstanding border node degrees. From a continental perspective, the analysis indicates that Asian and African countries have a closer relationship between AS and territorial networks, while Europe’s connections are relatively sparse. Over time, we observe a slight decline in deployment consistency in Asia, Africa, and Europe, a slight increase in border connection consistency in Asia, Africa, and North America, and enhanced impact in Asia, Africa, Europe, and South America. These trends suggest that the integration between AS and territorial networks is intensifying in most countries. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

21 pages, 2361 KB  
Article
Einstein Aggregation Operator Technique in Circular Fermatean Fuzzy Environment for MCDM
by Revathy Aruchsamy, Inthumathi Velusamy, Prasantha Bharathi Dhandapani and Taha Radwan
Symmetry 2024, 16(9), 1243; https://doi.org/10.3390/sym16091243 - 22 Sep 2024
Cited by 4 | Viewed by 1515
Abstract
An Ethernet cable enables users to connect their electronic devices, such as smartphones, computers, routers, laptops, etc., to a network that permits them to utilize the internet. Additionally, it transfers broadband signals among connected devices. Wi-Fi is tremendously helpful with small, handheld gadgets, [...] Read more.
An Ethernet cable enables users to connect their electronic devices, such as smartphones, computers, routers, laptops, etc., to a network that permits them to utilize the internet. Additionally, it transfers broadband signals among connected devices. Wi-Fi is tremendously helpful with small, handheld gadgets, but if capacity is required, cable Ethernet connectivity cannot be surpassed. Ethernet connections typically work faster than Wi-Fi connections; they also tend to be more flexible, have fewer interruptions, can handle problems rapidly, and have a cleaner appearance. However, it becomes complicated to decide upon an appropriate Ethernet cable. The circular Fermatean fuzzy set (∘FF), an extension of the interval-valued Fermatean fuzzy set(IVFFS) for two dimensions, provides a comprehensive framework for decision-making under uncertainty, where the concept of symmetry plays a crucial role in ensuring the balanced and unbiased aggregation of criteria. The main objective of this investigation was to select one of the best Ethernet cables using multi-criteria decision-making (MCDM). We employed aggregation operators (AOs), such as Einstein averaging and geometric AO, to amalgamate cable choices based on predefined criteria within the ∘FF set environment. Our approach ranks Ethernet cable options by evaluating their proximity to the ideal choice using ∘FF cosine and ∘FF dice similarity measures to ∘FF Einstein-weighted averaging aggregation and geometric operators. The effectiveness and stability of our suggested method are guaranteed by performing visualization, comparison, and statistical analysis. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

24 pages, 10669 KB  
Article
Smart IoT SCADA System for Hybrid Power Monitoring in Remote Natural Gas Pipeline Control Stations
by Muhammad Waqas and Mohsin Jamil
Electronics 2024, 13(16), 3235; https://doi.org/10.3390/electronics13163235 - 15 Aug 2024
Cited by 11 | Viewed by 13027
Abstract
A pipeline network is the most efficient and rapid way to transmit natural gas from source to destination. The smooth operation of natural gas pipeline control stations depends on electrical equipment such as data loggers, control systems, surveillance, and communication devices. Besides having [...] Read more.
A pipeline network is the most efficient and rapid way to transmit natural gas from source to destination. The smooth operation of natural gas pipeline control stations depends on electrical equipment such as data loggers, control systems, surveillance, and communication devices. Besides having a reliable and consistent power source, such control stations must also have cost-effective and intelligent monitoring and control systems. Distributed processes are monitored and controlled using supervisory control and data acquisition (SCADA) technology. This paper presents an Internet of Things (IoT)-based, open-source SCADA architecture designed to monitor a Hybrid Power System (HPS) at a remote natural gas pipeline control station, addressing the limitations of existing proprietary and non-configurable SCADA architectures. The proposed system comprises voltage and current sensors acting as Field Instrumentation Devices for required data collection, an ESP32-WROOM-32E microcontroller that functions as the Remote Terminal Unit (RTU) for processing sensor data, a Blynk IoT-based cloud server functioning as the Master Terminal Unit (MTU) for historical data storage and human–machine interactions (HMI), and a GSM SIM800L module and a local WiFi router for data communication between the RTU and MTU. Considering the remote locations of such control stations and the potential lack of 3G, 4G, or Wi-Fi networks, two configurations that use the GSM SIM800L and a local Wi-Fi router are proposed for hardware integration. The proposed system exhibited a low power consumption of 3.9 W and incurred an overall cost of 40.1 CAD, making it an extremely cost-effective solution for remote natural gas pipeline control stations. Full article
Show Figures

Figure 1

Back to TopTop