Although historical opinion has held that the red-black tree is faster than the AVL tree, benchmarks reveal that the AVL tree is faster than the red-black tree for deletion, often faster for insertion, and as fast or ...
详细信息
Following the hierarchical control architecture, this paper investigates the diffusion algorithm based distributed secondary control in islanded AC microgrids. The principle of diffusion algorithm is introduced first ...
详细信息
ISBN:
(数字)9781728158266
ISBN:
(纸本)9781728158273
Following the hierarchical control architecture, this paper investigates the diffusion algorithm based distributed secondary control in islanded AC microgrids. The principle of diffusion algorithm is introduced first and then diffusion algorithm-based distributed secondary control strategies are analyzed in details. Compared to the conventional consensus algorithm employed in the secondary control, it is shown that diffusion algorithm shows a faster convergence and a smaller deviation from the nominal value. A three-node islanded AC MG is simulated and the results confirm that the proposed diffusion-based secondary control outperforms consensus-based approach in terms of voltage/frequency restoration.
blockchain technology is one of the strategic emerging information technologies. It integrates a variety of technologies such as cryptography, peer-to-peer network, consensus algorithm and smart contract, and has been...
详细信息
ISBN:
(纸本)9781665426480
blockchain technology is one of the strategic emerging information technologies. It integrates a variety of technologies such as cryptography, peer-to-peer network, consensus algorithm and smart contract, and has been gradually applied in various fields. The contradiction between the rapid development of blockchain industry and the incompleteness of evaluation system and technical means has become increasingly prominent. The vulnerability of blockchain system is an important part of blockchain evaluation system. It is of great significance for the development of blockchain technology and large-scale application to fully study the vulnerability of blockchain system and conduct quantitative evaluation or real-time monitoring. This paper systematically analyzes the vulnerability of blockchain, and puts forward the technical indicators to evaluate the vulnerability of blockchain. Based on the vulnerability technical index of blockchain consensus algorithm and industrial blockchain consensus algorithm PBFT, a consensus algorithm confrontation deduction model is designed, and the vulnerability index of blockchain system using PBFT is experimentally simulated and evaluated.
In the age of rapidly progressing technology, the healthcare sector is embracing the revolution of digital transformation through the widespread adoption of Electronic Health Records (EHRs). Nevertheless, the digital ...
详细信息
ISBN:
(数字)9798350394412
ISBN:
(纸本)9798350394429
In the age of rapidly progressing technology, the healthcare sector is embracing the revolution of digital transformation through the widespread adoption of Electronic Health Records (EHRs). Nevertheless, the digital realm also presents notable challenges, particularly pertaining to the security and confidentiality of patients' delicate health data. This document introduces the innovative Smart GuardianChain, a blockchain-based distributed system crafted to tackle these pivotal concerns by establishing an infallible, decentralized, and impervious platform for the management and sharing of *** GuardianChain capitalizes on a robust consensus algorithm to ensure the integrity of EHRs, thus safeguarding the genuineness of medical records in an increasingly interconnected healthcare ecosystem. To guarantee that solely authorized entities have access to patient information, the system integrates an intricate mechanism for access control. Patients are bestowed with complete authority over their EHRs, enabling them to manage access permissions as they deem appropriate. Through extensive experimentation, our results demonstrate the scalability, efficiency, and effectiveness of the proposed system, which not only enhances security but also preserves patient privacy. By addressing the pressing privacy challenges that EHR systems face today, Smart GuardianChain stands poised to revolutionize the quality of healthcare services, fostering trust and confidence in the digital healthcare landscape.
This paper introduces a method called Sequential and Simultaneous Distance-based Dimension Reduction (S2D2R) that performs simultaneous dimension reduction for a pair of random vectors based on distance covariance (dC...
详细信息
Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distrib...
详细信息
Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distribution of key while using public key cryptography. To ensure that IOT connected devices can be trusted to be what they are supposed to be, robust IoT device authentication is mandated. Each IoT device therefore requires a unique identity which can be verified when the device tries to link to an intermediate device. One of the early solutions used to secure data transmission among parties in public networks is the Public Key Infrastructure (PKI) which is used to distribute and manage public keys (digital certificates) among different parties and these certificates are generated upon request by Certificate Authorities (CA). Nevertheless, for billions of devices connected to IoT and mobile phones, the distribution management of certificates for each client proved to be inefficient. In this research, we propose a decentralized authentication platform based on PKI and Ethereum Blockchain. The public key certificates are stored in a decentralized fashion and the private keys are stored inside the devices themselves. It also includes a protocol for Pre-Shared Keys (PSK) distribution. PSK keys are then used by PSK-based security protocols for securing the communication channel between two devices. This platform includes a client-side module, a server-side Wallet Management Function, and a smart contract deployed on the Ethereum Blockchain network. This platform can be used by applications for end devices and/or intermediate devices authentication and a secure Machine-to-Machine (M2M) communication. The proposed platform is validated by the implementation of a Secure Session Establishment between IoT devices. Results show that the solution implementation has minimal impact on the existing networks, and the secure session setup time between two devices is negligib
As an alternative to the energy greedy proof-of-work, new blockchains constrain the set of participants whose selection is debatable. These blockchains typically allow a fixed consortium of machines to decide upon new...
详细信息
As an alternative to the energy greedy proof-of-work, new blockchains constrain the set of participants whose selection is debatable. These blockchains typically allow a fixed consortium of machines to decide upon new transaction blocks. In this paper, we introduce the community blockchain that bridges the gap between these public blockchains and constrained blockchains. The idea is to allow potentially all participants to decide upon “some” block while restricting the set of participants deciding upon “one” block. We also propose an implementation called ComChain that builds upon the Red Belly Blockchain, the fastest blockchain we are aware of. It runs a consensus among the existing community to elect a new community. This reconfiguration speeds up as the number of removed nodes increases.
We study a variant of the single-choice prophet inequality problem where the decision-maker does not know the underlying distribution and has only access to a set of samples from the distributions. Rubinstein et al. [...
详细信息
Let M be a finitely generated submodule of a free module over a multivariate polynomial ring with coefficients in a discrete coherent ring. We prove that its module MLT(M) of leading terms is countably generated and p...
详细信息
We present the first mini-batch kernel k-means algorithm, offering an order of magnitude improvement in running time compared to the full batch algorithm. A single iteration of our algorithm takes O͠(kb2) time, signif...
详细信息
暂无评论