The icing of transmission lines can cause the accidents of line broken and tower collapse, which seriously affect the safe operation of the power grid. Accurate monitoring of icing conditions for transmission lines ha...
详细信息
In large power systems, large disturbance rotor angle instability and large disturbance voltage instability often occur in an intertwined and coupled manner. Accurately identifying the dominant one, i.e., the dominant...
详细信息
Bone cement filling is an important method for preventing osteoporosis and treating fractures. In bone cement filling surgery, the preparation and dosage of the cement usually depend on specific product manuals and th...
详细信息
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
详细信息
Modern power systems assess reliability N -k and k = 2, 3, 4,⋖ criteria to guarantee the secure, sustainable and optimal operation of power networks. However, performing these studies with traditional methods is compu...
详细信息
This poster describes the data analysis infrastructure used in a largeeU medical project, describes our experiences and lessons learned and presents our techniques for improving the reliability of the analysis proced...
This poster describes the data analysis infrastructure used in a largeeU medical project, describes our experiences and lessons learned and presents our techniques for improving the reliability of the analysis procedure.
Investigations in industrial and computational research emphasize the progress of blockchain-enabled smart contracts due to their resilient features, which include decen-tralised transaction storage, autonomous contra...
详细信息
This paper concentrates on new features of electric vehicle (eV) cluster in vehicle-to-grid (V2G) process. Two new variables are proposed to describe the impacts of V2G on grid considering differences between eV and g...
详细信息
e-voting system is a digital mechanism that enables people to voteelectronically, ensuring confidentiality, security, and transparency. Visual cryptography (VC) is a cryptographic technique where a secret image is di...
详细信息
Frequently task offloading in the Multi-access edgecomputing (MeC) system takes up a lot of network resources, which leads to serious network congestion problems. To deal with such problems, applying data pricing str...
详细信息
ISBN:
(数字)9781538683477
ISBN:
(纸本)9781538683477
Frequently task offloading in the Multi-access edgecomputing (MeC) system takes up a lot of network resources, which leads to serious network congestion problems. To deal with such problems, applying data pricing strategies in task offloading to schedule traffic data is perceived as a promising solution for Internet service providers (ISPs). However, the traditional application-oriented data pricing strategies do not consider user satisfaction of the task executing process, resulting in lower ISP profit. In this paper, a novel scheme named Appset Usage Patterns-Aware task offloading scheme (AUPA) is proposed to alleviate the tension between traffic data supply and user satisfaction. We mine the sequential patterns in frequent application sets to extract temporal association rules. Then these association rules are used to design a smart data pricing strategy to guide the task offloading decision. Finally, we formulate the ISP's profit maximization problem as a nonlinear programming (NLP) problem based on partial offloading, and we simulate the scheduling processuse using the Stackelberg game model. The performance of our solution is evaluated in terms of ISP's profit, consumers' surplus, capacity utilization, and traffic efficiency. The results show that our scheme significantly improves the ISP's profit by about 20% whileensuring capacity constraints compared with other baseline schemes.
暂无评论