Withthe intelligence and interconnection of power systems, distributed generation (DGs) and distributed control algorithm have been developed rapidly. Virtual power plant (VPP), formed by the aggregation of multiple ...
详细信息
Withthe large-scale access of new clean power generation energy to the power grid and the rapid development of smart electricity technology, more and more electric equipment is involved in the demand response to calm...
详细信息
In this paper, we propose a comprehensive anomaly detection model for the perception system of backfilling working faces. the model consists of three main components: the position encoding module, the time series pred...
In this paper, we propose a comprehensive anomaly detection model for the perception system of backfilling working faces. the model consists of three main components: the position encoding module, the time series prediction module, and the anomaly detection module. the position encoding module extracts global temporal information, including year, month, and day, based on the timestamp information of the data. the time series prediction module utilizes the Temporal Fusion Transformers model, which considers the latent correlations among different variables for accurate predictions. the anomaly detection module assesses the data's abnormality by comparing the predicted values withthe actual values. We validate the performance of the model on a real-world dataset, demonstrating its high accuracy and strong generalization capabilities for various types of sensor data in backfilling working faces. this research provides a viable solution for anomaly monitoring and management in backfilling operations, with significant practical implications.
this paper proposes a security defense scheme for industrial wireless sensor networks that utilizes the uniqueness and stability of clock slope characteristics to address the security defense challenges faced by indus...
详细信息
ISBN:
(数字)9798350363609
ISBN:
(纸本)9798350363616
this paper proposes a security defense scheme for industrial wireless sensor networks that utilizes the uniqueness and stability of clock slope characteristics to address the security defense challenges faced by industrial wireless sensor networks (IWSNs) under the constraints of low power consumption and low cost. By combining key elements of time synchronization technology, this scheme fully leverages the physical characteristics of the clock slope without the need to introduce additional protocols or algorithm designs, ensuring compatibility with existing time synchronization technology and providing an effective method for node identity recognition in large-scale IWSN environments.
Federated learning (FL) is a distributive machine learning (ML) approach that makes use of a centralised server to assist several Internet of things (IoT) devices in cooperatively training an ML model. IoT device loca...
详细信息
ISBN:
(数字)9798331523923
ISBN:
(纸本)9798331523930
Federated learning (FL) is a distributive machine learning (ML) approach that makes use of a centralised server to assist several Internet of things (IoT) devices in cooperatively training an ML model. IoT device local data is safeguarded since it never leaves the device in FL. Since distributed IoT devices in FL often gather their local data on their own, each device's data set may naturally constitute a unique source domain. In this research work, there will be maintaining the security enhancements for smart healthcare using federated learning. there will be securing the data of IoT -based sensors which may lose local data while using the smart systems. Removing this issue will give importance to local data also using the FL method. thus, this research involves considering different research work and gives the research methodology for the security-enhancing process using FL in IoT enhanced smart healthcare.
Precision Time Protocol (PTP) defined by the ieee standard is a precision clock synchronization protocol (ieee1588) for achieving high-precision synchronization in distributedsystems by means of network communication...
详细信息
Communicating UAVs (Unmanned Aerial Vehicles) are promising in terms of applications, but require to address numerous research issues. In this paper, we study the impact of the quality of Wi-Fi communications on the b...
详细信息
ISBN:
(数字)9798350369441
ISBN:
(纸本)9798350369458
Communicating UAVs (Unmanned Aerial Vehicles) are promising in terms of applications, but require to address numerous research issues. In this paper, we study the impact of the quality of Wi-Fi communications on the behavior of remotely controlled UAVs. To this end, we design an experimental platform composed of PX4 Vision UAVs, a Motion Capture system, and a tool to generate mission traffic from the ground station. By defining different scenarios and different traffic configurations, we conduct a set of experiments. this allows us to analyze how the presence of mission traffic impacts the stability of the reception of the control traffic, and how, in turn, it impacts the behavior of the UAVs.
Here, the gas sensor’s performance of NO2 gas based on MoS2 nanosheets with controlled 3D edge-enrich growth by chemical vapor deposition (CVD) method has been optimized. By controlling deposition process parameters ...
详细信息
After the distributed power supply connects to the new power system, the power grid scheduling is affected by voltage flash during the grid scheduling, resulting in an increase in operating costs of the power grid. It...
After the distributed power supply connects to the new power system, the power grid scheduling is affected by voltage flash during the grid scheduling, resulting in an increase in operating costs of the power grid. It is proposed that the high -penetration distribution power supply connects the diversified electric energy dual -layer scheduling method of the new power system. After mastering the current adjustment of the load and credible contribution information of the power grid, this paper builds a multi -purpose power system diversified power dual-layer scheduling model based on multi -target optimization. the upper layer scheduling target of this model is to optimize the quality of diversified electricity. the lower layer scheduling goal is to maximize the economic benefits of the new power system. the minimum value method can be solved to achieve the upper and lower target functions. the system schedules the optimal solution to ensure that under the access to high penetration distributed power supply, to ensure the maximization goal of the economic benefits of the power grid, it reasonably dispatches the displacement of the distributed power supply, and realizes the optimization of the diversified power quality of the new power system. the experimental results show that under the scheduling of this method, the voltage offset of the photovoltaic grid system is reduced by 0.60 MV. the operating cost of the new power system is also effectively controlled. Compared withthat before the scheduling, this method is available.
Underwater wireless sensor networks (UWSNs) has increased the growing body of researchers from both academia and commercial enterprises due to their vast resourceful applications in underwater environments. Withthe a...
详细信息
暂无评论