Optimizing Network Resilience with Segment Routing A Comparative Study of SR TI-LFA and rLFA
Conference paperAbstract: Network operators are confronted with the demanding requirements resulting from the evolution of IP networks. As a result, it has become necessary to provide rigorous Service Level Agreements (SLAs) that are in line with these requirements. However, traditional IP networks lack the necessary flexibility, scalability, and manageability to meet these demands. In order to address these limitations, the segment routing (SR) architecture has been developed. SR is based on source-routing and tunneling paradigms, which enable IP/MPLS and IPV6 networks to operate in a simplified and more scalable manner. The focus of this paper is on network protection (resiliency) using Topology Independent Loop-Free Alternatives Fast Re-Route (TI-LFA FRR) using MPLS as the underlying technology. SR overcomes the limitations of previous network protection mechanisms in terms of coverage and optimal path selection. To show the effectiveness of SR TI-LFA in comparison to its predecessor, Remote Loop-Free Alternate (rLFA), we have implemented various scenarios. These scenarios are designed to highlight the superior capabilities of TI-LFA.
Adel Ali Faraj Eluheshi, Mahmud Mansour; Najia Ben Saud, (05-2024), Libya: IEEE, 1-6
Towards Net Zero Energy Buildings for Sustainability
Journal ArticleNet Zero Energy (NZE) buildings play a crucial role in meeting the Sustainable Development Goals (SDG) and creating environmentally friendly residential areas. These buildings are designed to generate as much energy as they consume, resulting in a net balance of zero energy consumption from the grid. By integrating innovative technologies and sustainable design principles, NZE buildings minimize their carbon footprint and contribute to a more sustainable future. The acquired result has been presented and discussed. The concept of Net Zero Energy Buildings (NZEBs) has gained significant attention in recent years as a crucial strategy for achieving sustainability in the built environment. NZEBs are designed to produce as much energy as they consume, resulting in a net energy balance of zero over a specified period.
Omer.S. M. Jomah, (05-2024), Online AJAPAS: African Journal of Advanced Pure and Applied Sciences (AJAPAS), 3 (3), 228-234
Design of Wireless Communication Network for the Idref Automated Control System II; Advancing Connectivity in the City of Rujban
Journal ArticleThe quest for reliable water access has been a critical endeavor throughout history, and Rujban
City is no exception. Faced with the challenges of aging infrastructure and reliance on external
water sources, Rujban is turning towards technological innovation for solutions. This paper
outlines the design of the communication component within the Idref Automated Control System
2 (IACS II), a significant advancement in the automation of Rujban's water distribution system.
This system innovatively connects the city's central distributed tank to three distributed tanks via
a robust wireless communication network, while maintaining a wired connection to the Idref
collection tank, the main control station, and associated monitoring rooms and pumps. The system
employs microcontroller-based automation to manage water levels, control signals, and monitor
pump activity and potential leaks, with data displayed on an LCD screen. This approach is poised
to dramatically improve the efficiency and reliability of water distribution in Rujban City, marking
a key step forward in addressing its water supply challenges.
Omar S. Jomah, (04-2024), Academy journal for Basic and Applied Sciences (AJBAS): الأكاديمية الليبية, 1 (6), 9-23
Design of Wireless Communication Network for the Idref Automated Control System II; Advancing Connectivity in the City of Rujban
Journal ArticleThe quest for reliable water access has been a critical endeavor throughout history, and Rujban City is no exception. Faced with the challenges of aging infrastructure and reliance on external water sources, Rujban is turning towards technological innovation for solutions. This paper outlines the design of the communication component within the Idref Automated Control System 2 (IACS II), a significant advancement in the automation of Rujban's water distribution system. This system innovatively connects the city's central distributed tank to three distributed tanks via a robust wireless communication network, while maintaining a wired connection to the Idref collection tank, the main control station, and associated monitoring rooms and pumps. The system employs microcontroller-based automation to manage water levels, control signals, and monitor pump activity and potential leaks, with data displayed on an LCD screen. This approach is poised to dramatically improve the efficiency and reliability of water distribution in Rujban City, marking a key step forward in addressing its water supply challenges. Key Words: Wireless Network, Transmitter, Receiver, Control System, Water Pumping, Water Distribution, Smart Irrigation System.
Musa Kh A Faneer, Omer Saleh Mahmod Jomah, (04-2024), Academy journal for Basic and Applied Sciences (AJBAS): Libyan Academy, 1 (6), 1-13
Enhancing Data Center Performance using Virtual Extensible LAN (VXLAN) EmergingTechnology
Journal ArticleAbstract As more and more people turn to the cloud for their personal and professional purposes, cloud computing has become essential for the majority of users. Given the increased demand for cloud virtualization, the datacenter needs to be able to accommodate more virtual machines (VMs) that are housed on its servers. A datacenter employing old technology may accommodate up to 4096 VLANs, which would restrict the number of tenants it could serve. Spanning-Tree Protocol (SPT) is used by VLANs to remove loops, or duplicates, which block half of the routes and waste available bandwidth. The Virtual Extensible LAN (VXLAN), an emerging technology, must be used from there. It permits network segmentation similar to that of regular VLANs without obstructing traffic or reducing scalability. This study outlined both established and novel approaches and then clarified how to use them for data center topology. It also covered the drawbacks of utilizing conventional technologies. The benefits of cutting-edge technology and its superior influence on datacenter bandwidth utilization. To demonstrate how the new technology enhances data center performance, these technologies were finally replicated using the Eve emulator.
Adel Ali Faraj Eluheshi, Zahra Abdalla Elashaal2 ; Asra Abobker Alazragh3, (04-2024), ليبيا: الأكاديمية الليبية, -2 (-6), 1-14
Accuracy Comparison between F-RLS algorithm for CARAR systems and F-RLS algorithm for CARARMA systems
Journal ArticleIn this paper, the data filtering based recursive least squares algorithm for a CARAR systems, and data filtering based recursive least squares algorithm for a CARARMA systems are derived for comparison. These algorithms are based on the decomposition technique and in this technique, the main algorithm transform into two sub algorithms with smaller sizes. First, System identification model and another is the noise identification model. The problem here is the unknown variables in the information vectors and the used idea for solving this problem is to replacing these unknown variables with their corresponding estimates. Thus, the parameters of these two identification models can be estimated using recursive least squares method. Finally, a simulation example is provided to support the comparison between these proposed algorithms. KEYWORDS: identification algorithm; parameter estimation; filtering technique; decomposition technique; information vector.
Omer S. M. Jomah, (12-2023), Libyan Academy for Postgraduate Studies: Academic Journal of Science and Technology, 2 (1), 130-135
Understanding the Threat Posed by Chinese Cyber Warfare Units
Conference paperThe emergence of China as a global superpower has presented numerous challenges, among which is the growing threat posed by Chinese cyber warfare units. Operating under the People's Liberation Army (PLA), these units have been implicated in various high-profile cyber-attacks targeting both civilian and military entities worldwide. This paper endeavors to offer a comprehensive analysis of the risks presented by Chinese cyber warfare units, encompassing their organizational structure, tactics, and capabilities. By elucidating the nature and extent of this menace, we hope to enable governments and organizations to implement measures for better protection against Chinese cyber-attacks, as 80% of them target government bodies. In this study, we utilize the MITRE ATT&CK framework as a foundation to deliver an accessible, informative overview.
Omer Saleh Mahmod Jomah, (07-2023), 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA): IEEE, 359-364
Comprehensive State-of-the-Art of Vehicle-To-Grid Technology
Conference paperA vehicle is a means of transportation, such as a car, truck, or train, that is capable of moving people or goods from one place to another. Vehicles can be classified based on various factors, such as the type of fuel they use (e.g. gasoline, diesel, electricity), the number of wheels they have (e.g. two, four, six), and their intended use (e.g. passenger transportation). Vehicles may have connectors, such as plug sockets or fuel ports, that allow them to be connected to other devices or systems to form Vehicle-to-Everything (V2X) technology. For example, an Electric Vehicle (EV) may have a charging port that allows it to be connected to an electric power source to recharge its batteries such Vehicle-to-Grid (V2G) as one of the V2X forms. One of the challenges in charging EVs is the availability of charging infrastructure. In many places, there are relatively few public charging stations, which can make it difficult for EV owners to find a place to charge their vehicles when they are away from home. Additionally, charging an electric vehicle can take significantly longer time than filling up a gasoline-powered vehicle, which can be inconvenient for some drivers. In this review, the various topologies of V2X, connectors, charging challenges, and EV impact types on the grid are conducted.
Omer Saleh Mahmod Jomah, (07-2023), 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA): IEEE, 530-534
Stochastic Method and Sensitivity Analysis Assessments for Vehicle-to-Home Integration based on Renewable Energy Sources
Conference paperElectric Vehicles (EVs) as hotspot research are increasingly being used as alternative energy sources outside of transportation due to global variables like energy usage and environmental concerns. Gridable Electric Vehicle (GEV) is exploiting the opportunity for connecting EVs to the grid. EVs are now capable of contributing to addressing power limitations and acting as a reserve source of energy for the distribution grid in the Electric Vehicle Charging Facility (EVCF) to form Vehicle-to-Home (V2H). This paper is introduced to estimate impacts on the load for the uncertain behavior of EVs under domestic load after being sized using algorithms. Although, the integration of EVs provides an economical and environmental solution with a positive impact, however, it affects the power system when the uncertain number of EVs is provided as heavy duty. Sensitivity analysis has been considered in the study to investigate the expected changes in the system from the affected components.
Omer S. M. Jomah, (07-2023), 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA): IEEE, 783-787
Feature Selection for Fault Diagnosis Using Principal Component Analysis
Conference paperThe application of feature selection to fault diagnosis is presented. First, Filtered data identification algorithm is derived for controlled autoregressive autoregressive (CARAR) system in order to estimate the system parameters. The Proposed technique offers a high computational efficiency. These estimated parameters are referred as features and these features are not all have the same informative value. Next, features selection is carried out using principal components analysis. Finally, the simulation results demonstrate the value of the suggested procedures.
Omer S. M. Jomah, Nasar Aldian A. Shashoa, (07-2023), صربيا: IEEE-58th International Scientific Conference on Information, Communication and Energy Systems and Technologies (IEEE, 3-13