this research presents a new & integrated method to tackle the difficulties in distribution planning (DSP). It does this including distributed generation(DG), which promise in areas controlled by distribution util...
详细信息
distributed Energy Resources (DERs) refer to the energy resources typically located at the customer end. these resources include solar PV systems, electric vehicles, battery energy storage, etc. Integration of DERs em...
详细信息
In this literature, we investigate the repercussions of integrating decentralized generation on active power systems networks. this research will further be applied to the recently integrated 70 MW Ramarothole Solar P...
详细信息
Publishing data from IoT devices raises concerns of leaking sensitive information. In this paper we consider the scenario of publishing data on events with timestamps. We formulate three privacy issues, namely, whethe...
详细信息
ISBN:
(纸本)9781665495127
Publishing data from IoT devices raises concerns of leaking sensitive information. In this paper we consider the scenario of publishing data on events with timestamps. We formulate three privacy issues, namely, whether one can tell if an event happened or not;whether one can nail down the timestamp of an event within a given time interval;and whether one can infer the relative order of any two nearby events. We show that perturbation of event timestamps or adding fake events following carefully chosen distributions can address these privacy concerns. We present a rigorous study of privately publishing discrete event timestamps with privacy guarantees under the Pufferfish privacy framework. We also conduct extensive experiments to evaluate utility of the modified time series with real world location checkin and app usage data. Our mechanisms preserve the statistical utility of event data which are suitable for aggregate queries.
In today's world, fall incidents pose a significant risk to the elderly, often resulting in severe consequences. Falls can cause damage to the body, especially in elders, where it can be *** is vital to detect fal...
详细信息
Cloud computing platforms constructed on Trusted computing Technology are commonly referred to as trusted cloud computing. the core component of this technology is known as Trusted Platform Module (TPM). Its specifica...
详细信息
Traditional charge consumption prediction methods are hindered by the challenges posed by the dispersed locations of distributed energy stations, the complexity of network planning, and the stringent requirements for ...
详细信息
the advancements of internet of things sensors, artificial intelligence data analytics, and big data technologies have shifted Agriculture making new possibilities of productivity, sustainability, and decision making....
详细信息
distributed generation (DG) is being integrated into power systems worldwide to reduce fossil fuel consumption and avoid the expense of transmission lines. In addition to the aforementioned benefits, it also poses iss...
详细信息
this article provides an in-depth analysis of traditional water environment monitoring technologies, combined withthe practical needs of water quality monitoring, and considering the unique advantages of wireless sen...
详细信息
暂无评论