The Virtual Power Plant (VPP) is a promising solution to power systems' challenges. However, its energy management system (EMS) faces challenges due to centralized Big-Data analysis, i.e., complexity and high comp...
详细信息
The Virtual Power Plant (VPP) is a promising solution to power systems' challenges. However, its energy management system (EMS) faces challenges due to centralized Big-Data analysis, i.e., complexity and high computational cost. Decentralized strategies, e.g., federated learning (FL), have been proposed to mitigate these challenges. Although conventional FL can be implemented in VPPs, its effectiveness is limited by its typical structure, which relies on single-pattern modeling. Indeed, this particular structure leads to delays and inaccuracies in optimizing the heterogeneous generator dispatch patterns, particularly renewables. Hence, addressing this critical hindrance is essential for FL's efficient and effective deployment in VPPs. To overcome this drawback, this paper proposes novel VPP modeling utilizing multi-task FL modernized by multi-pattern modeling to decentralize the EMS processing. The proposed FL defines electricity generators' agents as clients collaborating to train the decentralized local data coordinated by a central server. The innovative idea is to create a novel multi-pattern-multi-task FL for electricity generation prediction so that the generator's agents learn to provide an optimized dispatch. Thus, the conventional multi-task FL is improved by proposing an optimized neural-network clustering technique. Simulation results demonstrate that multi-pattern-multi-task FL is 39%41% faster than the best-reported methods, i.e., teaching-learning-based and honey-bee-mating optimization algorithms. (c) 2017 Elsevier Inc. All rights reserved.
Medical Remote sensing and the Internet of Things (IoT) have emerged as powerful tools in the field of disease detection and monitoring. Early detection of infectious diseases is crucial in order to prevent outbreaks ...
详细信息
Data security and confidentiality are major goals now days due to the extensive use of the internet for data sharing. In modern era, most of the networks are compromised by intruders to grab access to private, confide...
详细信息
Data security and confidentiality are major goals now days due to the extensive use of the internet for data sharing. In modern era, most of the networks are compromised by intruders to grab access to private, confidential, and highly secured data. An intrusion detection system (IDS) is widely used to secure the network from getting compromised by intruders. Most of the IDS share the signatures of the novel attacks detected by anomaly approach for improving the detection rate and processing time. Security of signature shared by nodes is becoming a considerable problem. This paper presents a novel framework blockchain based hybrid intrusion detection system (BC-HyIDS), which uses the blockchain framework for exchanging signatures from one node to the other in distributed IDS. BC-HyIDS works in three phases where it uses both detection methods and blockchain in the third phase to provide security to data transferred through the network. This system makes use of a cryptosystem to encrypt the data stored in blocks to improve security one level higher. Hyperledger fabric v2.0 and Hyperledger sawtooth is used to implement system. Blockchain framework is created as a prototype using distributed ledger technology which helps in securing signature exchange. Performance of BC-HyIDS is evaluated in terms of accuracy, detection rate, and false alarm rate. From results, it is observed that a 2.8% increase in accuracy, 4.3% increase in detection rate, and a reduction of 2.6% in FAR is achieved. Blockchain performance is evaluated using Hyperledger fabric v2.0 and Hyperledger sawtooth on throughput, processing time, and average latency. BC-HyIDS shows improved performance when used with blockchain.
In block chain technology, a distributed architecture, blocks are the data storage and processing unit. Data must be exchanged from one party to another safely and securely, and the block chain must be updated using s...
详细信息
Ensuring information security in distributed information systems is a time-consuming task associated with processing large amounts of network data. Intrusion detection systems based on anomalies and machine learning a...
详细信息
With the rapid development of telemetry and telecontrol technology, the amount of information for acquiring telemetry data is increasing, which requires a large amount of storage space when storing, a large bandwidth ...
详细信息
distributed scheduling algorithms for throughput or utility maximization in dense wireless multi-hop networks can have overwhelmingly high overhead, causing increased congestion, energy consumption, radio footprint, a...
详细信息
ISBN:
(纸本)9781665405409
distributed scheduling algorithms for throughput or utility maximization in dense wireless multi-hop networks can have overwhelmingly high overhead, causing increased congestion, energy consumption, radio footprint, and security vulnerability. For wireless networks with dense connectivity, we propose a distributed scheme for link sparsification with graph convolutional networks (GCNs), which can reduce the scheduling overhead while keeping most of the network capacity. In a nutshell, a trainable GCN module generates node embeddings as topology-aware and reusable parameters for a local decision mechanism, based on which a link can withdraw itself from the scheduling contention if it is not likely to win. In mediumsized wireless networks, our proposed sparse scheduler beats classical threshold-based sparsification policies by retaining almost 70% of the total capacity achieved by a distributed greedy max-weight scheduler with 0.4% of the point-to-point message complexity and 2.6% of the average number of interfering neighbors per link.
Maize, a significant global food crop, is essential in agriculture and the economy. The price of maize futures is affected by many factors, and its data is a nonlinear, unstable, and long-term correlation, so it is di...
详细信息
In traditional CPU scheduling systems, it is challenging to customize scheduling policies for datacenter workloads. Therefore, distributed cluster managers can only perform coarse-grained job scheduling rather than fi...
详细信息
Code representation learning is an important way to encode the semantics of source code through pre-training. The learned representation supports a variety of downstream tasks, such as natural language code search and...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
Code representation learning is an important way to encode the semantics of source code through pre-training. The learned representation supports a variety of downstream tasks, such as natural language code search and code defect detection. Inspired by pre-trained models for natural language representation learning, existing approaches often treat the source code or its structural information (e.g., Abstract Syntax Tree or AST) as a plain token sequence. Unlike natural language, programming language has its unique code unit information (e.g., identifiers and expressions) and logic information (e.g., the functionality of a code snippet). To further explore those properties, we propose Abstract Code Embedding (AbCE), a selfsupervised learning method that considers the abstract semantics of code logic. Instead of scattered tokens, AbCE treats an entire node or a subtree in an AST as a basic code unit during pre-training, which preserves the entirety of a coding unit. Moreover, AbCE learns the abstract semantics of AST nodes via a self-distillation way. Experimental results show that it achieves significant improvements over state-of-the-art baselines on code search tasks and comparable performance on code clone detection and defect detection tasks even without using contrastive learning or curriculum learning.
暂无评论