Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 401

Full-Text Articles in Engineering

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


Improving Speech Recognition For Interviews With Both Clean And Telephone Speech, Sung Woo Choi Sep 2017

Improving Speech Recognition For Interviews With Both Clean And Telephone Speech, Sung Woo Choi

Journal of Undergraduate Research at Minnesota State University, Mankato

High quality automatic speech recognition (ASR) depends on the context of the speech. Cleanly recorded speech has better results than speech recorded over telephone lines. In telephone speech, the signal is band-pass filtered which limits frequencies available for computation. Consequently, the transmitted speech signal may be distorted by noise, causing higher word error rates (WER). The main goal of this research project is to examine approaches to improve recognition of telephone speech while maintaining or improving results for clean speech in mixed telephone-clean speech recordings, by reducing mismatches between the test data and the available models. The test data includes …


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016) Mar 2017

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …


Dtreesim: A New Approach To Compute Decision Tree Similarity Using Re-Mining, Gözde Bakirli, Derya Bi̇rant Jan 2017

Dtreesim: A New Approach To Compute Decision Tree Similarity Using Re-Mining, Gözde Bakirli, Derya Bi̇rant

Turkish Journal of Electrical Engineering and Computer Sciences

A number of recent studies have used a decision tree approach as a data mining technique; some of them needed to evaluate the similarity of decision trees to compare the knowledge reflected in different trees or datasets. There have been multiple perspectives and multiple calculation techniques to measure the similarity of two decision trees, such as using a simple formula or an entropy measure. The main objective of this study is to compute the similarity of decision trees using data mining techniques. This study proposes DTreeSim, a new approach that applies multiple data mining techniques (classification, sequential pattern mining, and …


Robust Adaptive Fuzzy Control Of A Three-Phase Active Power Filter Based On Feedback Linearization, Shixi Hou, Juntao Fei Jan 2017

Robust Adaptive Fuzzy Control Of A Three-Phase Active Power Filter Based On Feedback Linearization, Shixi Hou, Juntao Fei

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a robust adaptive fuzzy control system using feedback linearization is proposed for a three-phase active power filter (APF). The APF system is divided into two separate loops: the current dynamic inner loop and the DC voltage dynamic outer loop. Adaptive fuzzy tracking control using feedback linearization is employed for the current dynamic inner loop to overcome the drawbacks of the conventional method. The proposed controller can ensure proper tracking of the reference current and impose desired dynamic behavior, giving robustness and insensitivity to parameter variations. Adaptive fuzzy proportional-integral control is applied to the DC voltage dynamics outer …


The Impact Of Sampling Frequency And Amplitude Modulation Index On Low Order Harmonics In A 3-Phase Sv-Pvm Voltage Source Inverter, Qamil Kabashi, Myzafere Limani, Nebi Caka, Milaim Zabeli Jan 2017

The Impact Of Sampling Frequency And Amplitude Modulation Index On Low Order Harmonics In A 3-Phase Sv-Pvm Voltage Source Inverter, Qamil Kabashi, Myzafere Limani, Nebi Caka, Milaim Zabeli

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays, variable speed AC motors are widely used in industry and there are many speed adjustment techniques available. In the last decade there has been a trend towards the use of space vector PWM--IGBT inverters, due to easier digital realization and better utilization of the DC bus. Every power inverter produces a total harmonic distortion (THD) on its output that causes extra losses in stator of induction motors. By eliminating a number of low order voltage/current harmonics it is possible to reduce harmonic losses (stator losses) and mechanical oscillations in general. This could be achieved by implementing filters in the …


Gica: Imperialist Competitive Algorithm With Globalization Mechanism For Optimization Problems, Yousef Abdi, Mahmoud Lak, Yousef Seyfari Jan 2017

Gica: Imperialist Competitive Algorithm With Globalization Mechanism For Optimization Problems, Yousef Abdi, Mahmoud Lak, Yousef Seyfari

Turkish Journal of Electrical Engineering and Computer Sciences

The imperialist competitive algorithm (ICA) is a recent global search strategy developed based on human social evolutionary phenomena in the real world. However, the ICA has the drawback of trapping in local optimum solutions when used for high-dimensional or complex multimodal functions. In order to deal with this situation, in this paper an improved ICA, named GICA, is proposed that can enhance ICA performance by using a new assimilation method and establishing a relationship between countries inspired by the globalization concept in the real world. The proposed algorithm is evaluated using a set of well-known benchmark functions for global optimization. …


Novel Scheduling Algorithm For Optimizing Real-Time Multimedia Performance In Long Term Evolution-Advanced, Huda Adibah Mohd Ramli, Zairi Ismael Rizman Jan 2017

Novel Scheduling Algorithm For Optimizing Real-Time Multimedia Performance In Long Term Evolution-Advanced, Huda Adibah Mohd Ramli, Zairi Ismael Rizman

Turkish Journal of Electrical Engineering and Computer Sciences

Real-time multimedia applications are becoming increasingly popular among mobile cellular users. Given that Long Term Evolution-Advanced (LTE-A), which is an emerging mobile cellular standard, needs to support these multimedia applications, packet scheduling is of paramount importance in LTE-A. This paper proposes a packet scheduling algorithm known as novel scheduling for usage in the downlink of LTE-A. It takes channel quality, average throughput, and packet delay into account when determining the priority of each user. Simulation results demonstrate the efficacy of the proposed algorithm in optimizing real-time multimedia performance for more mobile cellular users.


Application Of Singular Value Decomposition Algorithm For Implementing Power Amplifier Linearizer, Rajbir Kaur, Manjeet Singh Patterh Jan 2017

Application Of Singular Value Decomposition Algorithm For Implementing Power Amplifier Linearizer, Rajbir Kaur, Manjeet Singh Patterh

Turkish Journal of Electrical Engineering and Computer Sciences

A power amplifier (PA) is an integral component of all base stations in wireless communication systems and is used for converting DC power supply into radio frequency output power, but PAs are highly nonlinear. To achieve high power conversion efficiency, the PA is operated near saturation, which causes intermodulation products and hence results in nonlinear distortion. Digital predistortion (DPD) is a technique used to compensate for the nonlinear distortion without compromising its efficiency. Fourth Generation Long Term Evolution (4G LTE) systems use a carrier aggregation scheme to combine separate available bandwidths to deliver high data speeds. In this paper the …


Adaptive Control Of Pure-Feedback Systems In The Presence Of Parametric Uncertainties, Mehrnoosh Asadi, Heydar Toossian Shandiz Jan 2017

Adaptive Control Of Pure-Feedback Systems In The Presence Of Parametric Uncertainties, Mehrnoosh Asadi, Heydar Toossian Shandiz

Turkish Journal of Electrical Engineering and Computer Sciences

The purpose of this study is to investigate an adaptive control approach for completely nonaffine pure-feedback systems with linear/nonlinear parameterization. In this approach, the parameter separation technique and the idea of the positive function of linearly connected parameters are coupled effectively with the combination of backstepping and time-scale separation. Subsequently, a fast dynamical equation is derived from the original subsystem, where the solution is sought to approximate the corresponding ideal virtual/actual control inputs. Furthermore, the adaptation law of unknown parameters can be derived based on Lyapunov theory in the backstepping technique and there is no need to design a state …


Full Occlusion Handling For Pedestrian Tracking Via Hybrid System, Xiaoyu Zhang, Shiqiang Hu, Huanlong Zhang, Xing Hu Jan 2017

Full Occlusion Handling For Pedestrian Tracking Via Hybrid System, Xiaoyu Zhang, Shiqiang Hu, Huanlong Zhang, Xing Hu

Turkish Journal of Electrical Engineering and Computer Sciences

Occlusion and lack of visibility even in sparse crowd scenes make it difficult to track individual pedestrians correctly and consistently, particularly in a single view. We present a novel pedestrian tracking approach that connects tracking with reidentification to locate and maintain the identity of certain people who may be occluded for a long time. First, two models are constructed. One model tracks the pedestrian and trains a classifier, while the other model reidentifies the pedestrian of interest from detection results with the trained classifier. Secondly, we design a set of transition rules for model switching. Finally, the two models work …


An Effective Empirical Approach To Voip Traffic Classification, Nazar Abbas Saqib, Yaqoot Shakeel, Moazzam Ali Khan, Hasan Mehmood, Muhammad Zia Jan 2017

An Effective Empirical Approach To Voip Traffic Classification, Nazar Abbas Saqib, Yaqoot Shakeel, Moazzam Ali Khan, Hasan Mehmood, Muhammad Zia

Turkish Journal of Electrical Engineering and Computer Sciences

It is beneficial for telecommunication authorities and Internet service providers (ISPs) to classify and detect voice traffic. It can help them to block unsubscribed users from using their services, which saves them huge revenues. Voice packets can be detected easily, but it becomes complicated when the application or port information in the packet header is hidden due to some secure mechanism such as encryption. This work provides effective voice packet classification and detection based on behavioral and statistical analysis, which is independent of any application, security protocol, or encryption mechanism. First we have made initial assessments through packet feature analysis …


A Self-Tuning Neurofuzzy Feedback Linearization-Based Damping Control Strategy For Multiple Hvdc Links, Saghir Ahmad, Laiq Khan Jan 2017

A Self-Tuning Neurofuzzy Feedback Linearization-Based Damping Control Strategy For Multiple Hvdc Links, Saghir Ahmad, Laiq Khan

Turkish Journal of Electrical Engineering and Computer Sciences

This research work proposes a multi-input multi-output (MIMO) online adaptive feedback linearization NeuroFuzzy control (AFLNFC) scheme to improve the damping of low frequency oscillations (LFOs) in an AC/DC power system. Optimized NeuroFuzzy identification architecture online captures the oscillatory dynamics of the power system through wide area measurement system (WAMS)-based measured speed signals of machines. Based on the identified power system model, the appropriate control law is derived through feedback linearization control with a self-tuned coefficient vector. The generated control signal modulates the real power flow through a high voltage direct current (HVDC) link during perturbed operating conditions and enhances system …


On The Application Of The Spectral Element Method In Electromagnetic Problems Involving Domain Decomposition, Ibrahim Mahariq Jan 2017

On The Application Of The Spectral Element Method In Electromagnetic Problems Involving Domain Decomposition, Ibrahim Mahariq

Turkish Journal of Electrical Engineering and Computer Sciences

One of the challenges in electromagnetics is to solve electromagnetic fields originated from a radiating source or a scattering object in distances that largely exceed the dimensions of the source or scatterer. In this paper, domain decomposition based on the application reasoning of the perfectly matched layer (PML) is studied by the spectral element method (SEM) for the first time in order to solve near and far electromagnetic fields without requiring substantially computational resources. Scattering from a loss-free dielectric cylinder and radiated fields from a line source are the problems utilized for the purpose of numerical demonstration in two dimensions …


Assessing The Importance Of Features For Detection Of Hard Exudates In Retinal Images, Kemal Akyol, Baha Şen, Şafak Bayir, Hasan Basri̇ Çakmak Jan 2017

Assessing The Importance Of Features For Detection Of Hard Exudates In Retinal Images, Kemal Akyol, Baha Şen, Şafak Bayir, Hasan Basri̇ Çakmak

Turkish Journal of Electrical Engineering and Computer Sciences

Diabetes disrupts the operation of the eye and leads to vision loss, affecting particularly the nerve layer and capillary vessels in this layer by changes in the blood vessels of the retina.~Suddenly loss and blurred vision problems occur in the image, depending on the phase of the disease, called diabetic retinopathy. Hard exudates are one of the primary signs of diabetic retinopathy. Automatic recognition of hard exudates in retinal images can contribute to detection of the disease. We present an automatic screening system for the detection of hard exudates. This system consists of two main steps. Firstly, the features were …


Lambda Optimization Of Constraint Violating Units In Short-Term Thermal Unit Commitment Using Modified Dynamic Programming, Logavani Kandasamy, Senthil Kumar Selvaraj Jan 2017

Lambda Optimization Of Constraint Violating Units In Short-Term Thermal Unit Commitment Using Modified Dynamic Programming, Logavani Kandasamy, Senthil Kumar Selvaraj

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a new approach with a three-stage optimization algorithm for the least-cost optimal solution of the unit commitment problem. In the proposed work, the optimal schedule is obtained by optimizing the lambda operator for the states that violate the inequality constraints. The objective of the work is to minimize the fuel cost when subjected to various constraints such as load balance, minimum up/down time, ramp limit, and spinning reserve. This method of committing the units yields the least-cost solution when applied to the IEEE 10-unit systems and 7-unit Indian utility practical systems scheduled for 24 h and the …


Dual Broadband Antenna With Compact Double Ring Radiators For Ieee 802.11 Ac/B/G/N Wlan Communication Applications, Meri̇h Palandöken Jan 2017

Dual Broadband Antenna With Compact Double Ring Radiators For Ieee 802.11 Ac/B/G/N Wlan Communication Applications, Meri̇h Palandöken

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a dual broadband antenna is proposed for WLAN communication modules supported by the IEEE 802.11 ac/b/g/n standard. The antenna design is based on two interspaced electrically small split-ring resonators, each of which is directly fed through the stepped impedance microstrip line with an optimized electromagnetic coupling distance in between. The proposed dual band antenna operates in the lower frequency band from 2.3 GHz up to 3 GHz with 2.65 GHz center frequency (26.4 % bandwidth) and in the higher frequency band from 4.7 GHz up to 6 GHz with 5.35 GHz center frequency (24.3% bandwidth). The radiating …


An Advanced Robust Fault-Tolerant Tracking Control For A Doubly Fed Induction Generator With Actuator Faults, Samir Abdelmalek, Linda Barazane, Abdelkader Larabi Jan 2017

An Advanced Robust Fault-Tolerant Tracking Control For A Doubly Fed Induction Generator With Actuator Faults, Samir Abdelmalek, Linda Barazane, Abdelkader Larabi

Turkish Journal of Electrical Engineering and Computer Sciences

Fault-tolerant controller (FTC) designs for doubly fed induction generators (DFIGs) with actuator faults have recently gained considerable attention due to their important role in maintaining the safety and reliability of DFIG-based wind turbines via configured redundancy. The objective of this paper is to propose a novel active fault-tolerant tracking control strategy for a DFIG subject to actuator faults. The proposed strategy consists of first designing a proportional integral observer (PIO) for simultaneous system states and fault estimation and then secondly the FTC, which depends on the estimated states and faults. The objective of such a controller is to drive the …


Energy-Hole Avoidance And Lifetime Enhancement Of A Wsn Through Load Factor, Krishna Pal Sharma, Teek Parval Sharma Jan 2017

Energy-Hole Avoidance And Lifetime Enhancement Of A Wsn Through Load Factor, Krishna Pal Sharma, Teek Parval Sharma

Turkish Journal of Electrical Engineering and Computer Sciences

In wireless sensor networks, nonuniform communication load across a network often leads to the problem of energy holes or hot spots, i.e. nodes nearer high activity regions deplete their energy much faster than nodes elsewhere. This may partition the network into unreachable segments and thus adversely affect network lifetime. The problem is more acute in random and sparsely deployed networks. Therefore, we propose a deployment strategy that, using the least possible nodes, prolongs network lifetime by avoiding energy holes and also ensures full sensing and communication coverage. The scheme handles the energy imbalance by selecting an appropriate set of communication …


Design And Realization Of A Novel Planar Array Antenna And Low Power Lna For Ku-Band Small Satellite Communications, Lida Kouhalvandi, Osman Ceylan, Selçuk Paker, Hasan Bülent Yağci Jan 2017

Design And Realization Of A Novel Planar Array Antenna And Low Power Lna For Ku-Band Small Satellite Communications, Lida Kouhalvandi, Osman Ceylan, Selçuk Paker, Hasan Bülent Yağci

Turkish Journal of Electrical Engineering and Computer Sciences

This article presents both a four-element novel microstrip array antenna and a low noise amplifier (LNA) for a Ku-band small satellite receiver. It includes all design details with measurement results of the fabricated array antenna and LNA. Measured minimum and maximum gains of the proposed antenna are 10.1 and 10.9 dBi in 11.9-12.9 GHz band frequency. The designed LNA has a noise figure lower than 1.5 dB and gain higher than 8 dB (at 2 V, 10 mA biasing). In order to reduce the design period and cost, discrete components are chosen and a hetero-junction FET is used as the …


Design And Implementation Of A Modified Communication Disturbance Observer For Teleoperation Systems, Zahra Zeinaly, Amin Ramezani, Sadjaad Ozgoli Jan 2017

Design And Implementation Of A Modified Communication Disturbance Observer For Teleoperation Systems, Zahra Zeinaly, Amin Ramezani, Sadjaad Ozgoli

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a novel structure for a communication disturbance observer in teleoperation systems is proposed to achieve robust stability. A time delay compensation method based on the concept of network disturbance and a communication disturbance observer (CDOB) has been proposed in past research. Unlike model-based approaches, it works without a time delay model. Therefore, it can be implemented in teleoperation systems with unknown and time-varying delay. However, it has been observed that the system model errors and external disturbances seriously affect the steady-state characteristics. Hence, in this paper, to achieve robustness against disturbance and model uncertainty, the structure of …


Communications Protocol For Power Management In Smart Homes, Milan Bjelica, Mirjana Simic Pejovic Jan 2017

Communications Protocol For Power Management In Smart Homes, Milan Bjelica, Mirjana Simic Pejovic

Turkish Journal of Electrical Engineering and Computer Sciences

Emergency situations, incentives for energy efficiency, new pricing plans, and distributed electricity market jointly require home automation systems that would conform an instantaneous load to a dynamically set limit. In this paper, a novel machine-to-machine communications protocol that interconnects a smart grid and smart house is described. ''Intelligent'' domestic appliances use it to coordinate their switch-on times so that the assigned power quota will not be exceeded. In this way, the end-user experience can be improved by reducing the electricity bills, conveniently conforming to prepaid pricing plans, or even by providing continued service at possibly reduced consumption levels during power …