The proceedings contain 154 papers. The topics discussed include: transient stability analysis of power system considering multiple inverter aggregation model;development of the safeguard companion for secondary safet...
ISBN:
(纸本)9798331533694
The proceedings contain 154 papers. The topics discussed include: transient stability analysis of power system considering multiple inverter aggregation model;development of the safeguard companion for secondary safety measures of relay protection;an open interconnection system for computing power based on service mesh;securing distributed power dispatching systems: a framework for cybersecurity and 5G integration;utilizing deep belief networks for power system state estimation and anomaly detection;fire detection approach for 10kV distribution room based on spatial perception and hybrid attention mechanism;research on the application of information sharing technology in distributed photovoltaic aggregation optimization control strategy;and construction and optimization of key quality problem graph of power equipment based on association rule mining.
Increasing cyber threats have rendered traditional security solutions such as firewalls and intrusion-detection/prevention systems insufficient in providing adequate protection against advanced persistent threats to h...
详细信息
Intelligent Transportation systems (ITS) involve integrating information and communication technologies with traffic infrastructure and vehicles to support the development of more sustainable transportation systems. H...
详细信息
ISBN:
(纸本)9798400703706
Intelligent Transportation systems (ITS) involve integrating information and communication technologies with traffic infrastructure and vehicles to support the development of more sustainable transportation systems. However, ITS face security, reliability, and efficiency challenges in storage and sharing real-time critical data. To address these issues, we propose an architecture based on edge computing and blockchain to enable secure data storage and sharing for ITS. By leveraging edge computing capabilities and blockchain's distributed ledger technology, our architecture enhances data security, ensures data integrity, and improves real-time data processing in ITS. We analyze a smart parking system application scenario, and the results demonstrate a significant reduction in average latency and storage usage, highlighting the positive impact of our solution on enhancing the overall performance and reliability of ITS.
The Device-to-Device (D2D) communications in wireless communication system ensures the energy and spectral efficiency, data rates and total system capacity. However, the dynamic and complex nature of a 5G system, vari...
详细信息
Convolution has been widely employed in image processing and computer vision applications such as picture augmentation, smoothing, and structure extraction. In addition, convolution operations are the most prevalent c...
详细信息
ISBN:
(纸本)9798400700439
Convolution has been widely employed in image processing and computer vision applications such as picture augmentation, smoothing, and structure extraction. In addition, convolution operations are the most prevalent computing patterns in machine learning domains. Convolutions, for example, are used in a substantial chunk of state-of-the-art convolutional neural network operations. Therefore, effectively mapping convolution operations onto hardware architectures is crucial for achieving superior performance while accelerating convolutional neural networks. In this paper, we proposed various algorithms to efficiently map the 2-D convolution operation onto a dynamically reconfigurable resource array and distributed memory architecture. Furthermore, we have discussed the mapping of 2-D convolution on the target architecture for an input matrix of arbitrary size, as well as the generalization of the proposed approaches for multi-column DRRA architectures.
The advancement of computernetworks has resulted in the emergence of various networking architectures, including Software-Defined Networking (SDN) and traditional networks. While traditional networks use a distribute...
详细信息
This paper addresses the increasing interest of industries in remote and distributed audio production applications. Specifically, it provides a detailed overview of the current state of the art in this domain, describ...
详细信息
ISBN:
(纸本)9798350366532;9798350366525
This paper addresses the increasing interest of industries in remote and distributed audio production applications. Specifically, it provides a detailed overview of the current state of the art in this domain, describing a case-study analysis of an immersive audio content production ecosystem, streamed over a distributed network infrastructure. We analyze performance, reliability and latency of algorithms, communication protocols and systems (with multiple geographical distributions of nodes), exploring the potential of leveraging cutting-edge technologies to better meet the requirements of both remote audio content producers and customers. Our proposal reaches good numerical results (in terms of latency and reliability) and is provided with a versatile and optimized set of audio tools capable of transferring real-time native immersive audio recordings, over the web, to distant geographical nodes where customers in turn, can listen and rapidly ask for contents processing with equal flexibility towards their own listening system.
In the modern digital landscape, cyber-attacks have become highly advanced and difficult to detect, especially in distributedsystems. These Denial of Service (DoS) or distributed Denial of Service (DDoS) attacks lead...
详细信息
Internet of Things (IoT) data and devices face significant security concerns. It is well-known that IoT security standards and frameworks have yet to be established due to variations with IoT developers and manufactur...
详细信息
Federated learning (FL) is a distributed machine learning technique that enables remote devices to share their local models without sharing their data. While this system benefits security, it still has many vulnerabil...
详细信息
暂无评论