Abstract-Insulation performance of epoxy surface in GIS systems is influenced by the applied superimposed voltage of AC and overvoltage. the simultaneous measurement of the partial discharges (PDs) and applied voltage...
Abstract-Insulation performance of epoxy surface in GIS systems is influenced by the applied superimposed voltage of AC and overvoltage. the simultaneous measurement of the partial discharges (PDs) and applied voltage can help to evaluate the condition of GIS equipment more accurately. A novel composite sensor for PD UHF signals and overvoltage measurement is proposed to realize the simultaneous detection. the effective height of the composite sensor is calculated with FDTD model and the preliminary optimization is carried based on it. the effectiveness of the composite sensor is tested on an epoxy surface discharge model under of AC voltage, lightning impulse and superimposed voltage. Experiment results show that the extra PDs are excited by the superimposed LI and the proposed sensor is capable to detect the voltage waveform and PD signals under the superimposed condition.
Middle weak Roman domination is an important graph theory concept that has important applications in defense, network design, optimization, and resource management. A middle weak Roman dominating function assigns to e...
详细信息
ISBN:
(数字)9798331533663
ISBN:
(纸本)9798331533670
Middle weak Roman domination is an important graph theory concept that has important applications in defense, network design, optimization, and resource management. A middle weak Roman dominating function assigns to every vertex of a graph weights from the set {0,1,2,3} under certain conditions: zero-weight vertices must be neighbors of at least one positive-weighted vertex; one-weight vertices may have at most one zero-weight neighbor; two-weight vertices may have at most two zero-weight neighbors; and three-weight vertices may have any number of zero-weight neighbors. the total weight of assigned weights determines the weight of the function, and the least possible weight among all valid functions is referred to as the middle weak Roman domination number. this paper explores the calculation of this number across various graph classes, including complete graphs, paths, cycles, wheels, stars, sun graphs, complete binary trees, grids, and lollipop graphs. Python pseudo-code is provided for efficient computation.
In many applications using wireless sensor networks, the reliability of monitored data is crucial to analyze situations and take decisions. Compressed sensing methods are effective to ensure durability of a wireless s...
In many applications using wireless sensor networks, the reliability of monitored data is crucial to analyze situations and take decisions. Compressed sensing methods are effective to ensure durability of a wireless sensor network installation and to overcome communication failures by drastically lowering the amount of data to transmit. the method proposed in this paper aims to perform an abstraction of the signals sparsity model required by compressed sensing in order to use a deep learning-based approach. this method is designed to be effective for all kinds of transient or temporally dynamic signals sufficiently regular to be predictable, that is to say signals that can be implicitly modelled by a sparse representation. through the collaboration of two recurrent neural networks and signal processing algorithms, our temporal method outperforms, in terms of accuracy, state-of-art methods, including distributed compressed sensing, time series imputation and forecasting deep learning methods. thus, high compression rates up to 95% can be reached while leading to an error of less than 0.5°C in reconstructing temperature signals.
Wireless sensor networks (WSNs) have been widely used in many applications such as environment monitoring and surveillance. Routing flexibility is one of the important issues to improve the performance of WSNs. In thi...
Wireless sensor networks (WSNs) have been widely used in many applications such as environment monitoring and surveillance. Routing flexibility is one of the important issues to improve the performance of WSNs. In this paper, we propose a novel distributed approach to improve routing flexibility in WSNs. the proposed approach utilizes a graph-based mechanism to transmit the data packets over reliable and energy efficient paths. this approach dynamically adjusts the routing paths according to the changes in traffic patterns and environmental conditions. Moreover, we design an adaptive weight-based routing algorithm that can further increase routing flexibility. the proposed approach also provides an energy-aware mechanism and an efficient communication channel selection protocol to save the energy consumption of the network. the proposed mechanism has been simulated and evaluated through ns-2. the experimental results show that the proposed approach can significantly improve routing flexibility and reduce the energy consumption of the WSNs.
distributed Denial of Service (DDoS) is defined as an attack targeting a server, where the server is overwhelmed by an overflow of traffic, leading to a computer system being compromised. To prevent these attacks from...
详细信息
ISBN:
(数字)9798331518882
ISBN:
(纸本)9798331518899
distributed Denial of Service (DDoS) is defined as an attack targeting a server, where the server is overwhelmed by an overflow of traffic, leading to a computer system being compromised. To prevent these attacks from happening, thus allowing the computer systems to maintain their normal behavior, a long short-term memory (LSTM) Time-Series model can recognize sequential characteristics in the data in order to predict whether a DDoS attack is occurring. Our approach leverages various aspects of network traffic such as Flow ID, Source IP, Destination IP, and Destination Port, and analyzes the accuracy and reliability using LSTMs to improve DDoS attack prediction accuracy. In this study we analyzed the relative efficiency of Quantum LSTM (QLSTM) over that of Classical LSTM, and found that both Quantum and Classical LSTM models train quickly and within a few epochs the accuracy increases to 0.99 and above. the validation of the models proved that QLSTM achieved better Recall, Accuracy, Precision, and F1 scores as compared to classical LSTM, making it an ideal candidate for DDoS attack predictions. this study proves the potential of applying deep learning techniques to strengthen network security, which has become increasingly important withthe rise of complex cybersecurity threats.
the access of distributed photovoltaic with high permeability will lead to significant changes in the fault characteristics of distribution network. this paper takes the grid-connected power system of distributed phot...
详细信息
ISBN:
(数字)9798350368239
ISBN:
(纸本)9798350368246
the access of distributed photovoltaic with high permeability will lead to significant changes in the fault characteristics of distribution network. this paper takes the grid-connected power system of distributed photovoltaic power supply on a demonstration ship as the research object, and analyzes the fault characteristics of distributed photovoltaic access and short circuit current. the change of fault characteristics and short-circuit current in different segments before and after the failure of PV power supply when it is connected to 440V bus and 230V bus are studied.
For cost-effective applications, low number of current sensors are preferable to decrease the expense and size of the electric drive system of permanent magnet synchronous machine (PMSM). the renovation of the three-p...
详细信息
the proceedings contain 17 papers. the special focus in this conference is on Cloud computing. the topics include: Design of an Evaluation System of Limb Motor Function Using Inertial sensor;Towards a GPU-Acceler...
ISBN:
(纸本)9783030991906
the proceedings contain 17 papers. the special focus in this conference is on Cloud computing. the topics include: Design of an Evaluation System of Limb Motor Function Using Inertial sensor;Towards a GPU-Accelerated Open Source VDI for OpenStack;trustworthy IoT computing Environment Based on Layered Blockchain Consensus Framework;heuristic Network Security Risk Assessment Based on Attack Graph;research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System;Energy- and Reliability-Aware Computation Offloading with Security Constraints in MEC-Enabled Smart Cities;a Review of Cross-Blockchain Solutions;a Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges;a Dynamic Gesture Recognition Control File Method Based on Deep Learning;A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a distributed Environment;triangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection in Cloud computing;optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing;a Survey of Face Image Inpainting Based on Deep Learning;layered Service Model Architecture for Cloud computing;KPG4Rec: Knowledge Property-Aware Graph for Recommender systems.
Smart manufacturing demands industrial Internet of things (loT) that encompasses components such as sensors, industrial control systems, programmable logic controllers, gateways, wireless devices, machine series conne...
详细信息
ISBN:
(数字)9798350360721
ISBN:
(纸本)9798350360738
Smart manufacturing demands industrial Internet of things (loT) that encompasses components such as sensors, industrial control systems, programmable logic controllers, gateways, wireless devices, machine series connection modules, and edge computing hosts. However, these components often use different communication protocols, and collecting, transmitting, and integrating device source data. In this study, data regarding a coating process were collected and transmitted to a data server in real-time over Bluetooth for presentation and storage. the data were then processed and analyzed to optimize production. Specifically, a supervisory control and data acquisition (SCADA) system based on Bluetooth low energy (BLE) modules was developed. the system comprised a self-developed BLE gateway that interfaced wirelessly with multiple self-developed Bluetooth devices for collecting equipment and sensor data. these devices used the Modbus TCP or RTU protocols to collect sensor data, and converted and transmitted the data to the data server. Subsequently, the data were displayed, stored, and analyzed by the graphical control system, improving manufacturing efficiency.
the MAC routing protocol for mobile sensor networks is a method of communication that enables the data transfer between sensors over an established network. this protocol is designed to provide reliable, fast and effi...
the MAC routing protocol for mobile sensor networks is a method of communication that enables the data transfer between sensors over an established network. this protocol is designed to provide reliable, fast and efficient data delivery between nodes within a mobile sensor network. It differs from the traditional routing protocol in that it takes into consideration the mobility of the nodes and changes the routes dynamically to meet the dynamic requirements of the network. the main features of MAC for mobile sensor networks include route discovery and maintenance, dynamic path selection and dynamic quality of service. It also ensures reliability by providing multiple paths for data transmission and path diversity for redundant data transfer. Additionally, it provides fault tolerance and security via neighbor discovery and authentication. the protocol is also suited to heterogeneous networks due to the support for different types of communication technologies such as 802.11, ZigBee, etc. Furthermore, the MAC routing protocol provides multiple solutions such as deferred ordering, probabilistic forwarding and distributed routing. the MAC routing protocol, therefore, provides an effective way to connect sensors in mobile sensor networks.
暂无评论