G.3.5. Systems
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

M. Rezvani

Volume 6, Issue 2 , July 2018, , Pages 387-397

https://doi.org/10.22044/jadm.2017.5581.1668

Abstract
  Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional ...  Read More

G.3.5. Systems
Fractional Modeling and Analysis of Buck Converter in CCM Mode Peration

A. Moshar Movahhed; H. Toossian Shandiz; Syed K. Hoseini Sani

Volume 5, Issue 2 , July 2017, , Pages 327-335

https://doi.org/10.22044/jadm.2016.738

Abstract
  In this paper fractional order averaged model for DC/DC Buck converter in continues condition mode (CCM) operation is established. DC/DC Buck converter is one of the main components in the wind turbine system which is used in this research. Due to some practical restriction there weren’t exist ...  Read More