With the development of high-speed roads and increase of lighting, ventilation and monitoring devices, it is necessary to study a real-time and robust voltage stability monitoring method. In this paper, a new method o...
详细信息
ISBN:
(纸本)9781728176871
With the development of high-speed roads and increase of lighting, ventilation and monitoring devices, it is necessary to study a real-time and robust voltage stability monitoring method. In this paper, a new method of voltage monitoring is proposed, and this method relies on voltage dynamical entropy and its deviation. At the beginning of the paper, the voltage is symbolized by using a maximum-entropy-based clustering algorithm (MECA), and the MECA is put forward in this paper. Then, a dynamical pattern is constructed, and voltage dynamical entropy is calculated of a short-term signals. The entropy is used to describe the voltage fluctuation and voltage dynamical properties. Subsequently, the entropy and a voltage deviation consist of a voltage feature. And a fuzzy classifier is constructed and used for monitoring a voltage stability status. At last, a simulation is given to demonstrate feasibility and effectiveness of the proposed method.
While modeling the applications for a problem in cloud computing, researchers and scientists frequently use graphs as abstractions. Graphs provide structural models that make it possible to analyze and understand how ...
详细信息
While modeling the applications for a problem in cloud computing, researchers and scientists frequently use graphs as abstractions. Graphs provide structural models that make it possible to analyze and understand how many separate systems act together. The omnipresence in cloud computing systems is increasing information networks. The graph embedding algorithms preserve the microscopic structure over the cloud, and many of them miss the mesoscopic structure of the networks. In this paper, asymmetric non-negative Laplace regularization for cloud platform and matrix factorization is implemented for network embedding. The proposed algorithm preserves the mesoscopic structure in cloud computing, the learned model from the Laplace, and matrix factorization. The embedded cloud network can be used for link prediction, vertex recommendation, node clustering. It is a scalable algorithm for higher proximity preserving along with community structure. The correctness and convergence are measures as performance parameters in the network. Based factorization is used for updating the rules. The experimental study shows that the proposed system is well-organized compared to the existing process in structure preservation in cloud computing.
The Correlation Power Analysis (CPA) is one of the powerful Side-Channel Analysis (SCA) methods to reveal the secret key using linear relationship between intermediate values and power consumption. To defense the anal...
详细信息
ISBN:
(纸本)9783030652999;9783030652982
The Correlation Power Analysis (CPA) is one of the powerful Side-Channel Analysis (SCA) methods to reveal the secret key using linear relationship between intermediate values and power consumption. To defense the analysis, many crypto-systems often embed the shuffling implementation which shuffles the order of operations to break the relationship between power consumption and processed information. Although the shuffling method increases the required number of power traces for deploying the CPA, it is still vulnerable if an attacker can classify or group the power traces by operations. In this work, we propose a new CPA technique by efficiently clustering the power traces using signal envelopes. We demonstrate theoretically reduced time complexity and tested our approach with the eight-shuffling AES implementations.
Aerial recovery technology for aircrafts plays a significant role in practical applications, which presents a challenging problem in cooperative trajectory planning. To solve the problem, a hierarchical trajectory pla...
详细信息
ISBN:
(纸本)9781728180250
Aerial recovery technology for aircrafts plays a significant role in practical applications, which presents a challenging problem in cooperative trajectory planning. To solve the problem, a hierarchical trajectory planning architecture is proposed in this paper. Firstly, the waypoints of the mother aircraft trajectory are obtained based on the distribution of the child aircrafts by using a hierarchical clustering algorithm. A greedy algorithm is used to obtain the traverse sequence for the waypoints and the mother aircraft trajectory is generated based on the Dubins path. Secondly, a genetic algorithm is employed to optimize the recovery position and recovery time for each child aircraft. Lastly, the trajectory of each child aircraft is generated by using a double-stage trajectory generation method. Simulation results validate the effectiveness of the proposed method for cooperative trajectory planning in aerial recovery.
To meet the increasingly complex requirements in access control using XACML (eXtensible Access Control Markup Language), it is necessary for a policy decision engine to deal with large-scale policy sets and intensivel...
详细信息
To meet the increasingly complex requirements in access control using XACML (eXtensible Access Control Markup Language), it is necessary for a policy decision engine to deal with large-scale policy sets and intensively abundant requests efficiently. A practical policy evaluation engine, namely CSRM, is proposed to tackle this problem. The PDP (Policy Decision Point) in traditional policy decision engines is replaced by a new component ESPDP (Efficient Searching Policy Decision Point). CK-means algorithm is studied in this paper to perform clustering among all policies in a policy set. ESPDP is adopted to construct a virtual mapping table on the basis of the result of the CK-means algorithm. The virtual mapping table stores the relationship between subject attributes and policies, such that the irrelevant polices are excluded when rule search is carried out. Besides, the rules in every policy are merged according to particular principles, thus saving storage space and greatly speeding up rule search. When responding to intensive requests, a supervised response method is applied to determine an optimal rule search order by analyzing the response to the requests in a short period. The experimental results on four practical datasets demonstrate that our proposed CSRM outperforms some classic and state-of-the-art methods when dealing with large-scale policy sets. With high practicality and wide applicability, CSRM effectively eliminates the bottlenecks of improving PDP evaluation performance, and can respond to requests efficiently when handling large-scale policy sets. (C) 2020 Elsevier B.V. All rights reserved.
Because the degree of mastering knowledge points in courses in traditional cognitive diagnostic models cannot be probabilistic, there are only two situations: mastery and non-mastery. Therefore, for the current resear...
详细信息
ISBN:
(数字)9781728199283
ISBN:
(纸本)9781728199283
Because the degree of mastering knowledge points in courses in traditional cognitive diagnostic models cannot be probabilistic, there are only two situations: mastery and non-mastery. Therefore, for the current research, the recommendations of knowledge points recommended by learners' learning behavior attributes are not fully considered to be insufficient, this paper proposes a curriculum knowledge point recommendation algorithm model based on learning diagnosis, the model comprehensively considers the learner's learning emotions, learner problem test conditions and knowledge point characteristics, and the film and television synthesis in the Chaoxing online teaching service platform the course learning data is tested to verify the effectiveness of the recommendation algorithm. The experimental results show that the effectiveness and accuracy of the recommendation algorithm model proposed in this paper can meet the learning needs of learners.
This paper proposes a device-to-device communication based small cell (SC) deployment scheme in Smart Grid, named as JODI-D2D, to achieve high QoS, high reliability, and high energy efficiency. SC deployment is formul...
详细信息
ISBN:
(纸本)9781728182988
This paper proposes a device-to-device communication based small cell (SC) deployment scheme in Smart Grid, named as JODI-D2D, to achieve high QoS, high reliability, and high energy efficiency. SC deployment is formulated as a joint optimization of data rate maximization and interference minimization, serving the distributed smart grid user equipment (SLUE), while reducing the computation latency. The SC powering strategy is determined with the k-means clustering, which considers the features of SGUEs, endowed by both power and communication layers. Simulation results show that the proposed JODI-D2D achieves high QoS with improved data rate performance, sufficient computation latency and maximized energy efficiency for SG applications.
A key task in organization design is to group elements (e.g., roles) into sub-units (e.g., teams or departments). This task is computationally challenging as one must take into consideration a potentially large number...
详细信息
A key task in organization design is to group elements (e.g., roles) into sub-units (e.g., teams or departments). This task is computationally challenging as one must take into consideration a potentially large number of interdependencies between the elements. It also requires data about work processes in the organization, which are rarely present. We have initiated a research program that aims at developing a tool-Reconfig-to improve grouping decisions. It first collects data from employees about their working relationships (i.e., interdependencies) and then uses a computer algorithm to cluster the data in the most optimal manner. The clustered solution represents the formal structure that minimizes coordination costs by grouping the most highly interdependent elements together. We describe the tool, report on two pilot applications, and discuss both the future potential and limitations of the approach.
Network anomalies are unusual traffic mainly induced by network attacks or network failures. Therefore it is important for network operators as end users to detect and diagnose them to protect their network. However, ...
详细信息
ISBN:
(纸本)9783030325237;9783030325220
Network anomalies are unusual traffic mainly induced by network attacks or network failures. Therefore it is important for network operators as end users to detect and diagnose them to protect their network. However, these anomalies keep changing in time, it is therefore important to propose detectors which can learn from the traffic and spot anomalies without relying on any previous knowledge. Unsupervised network anomaly detectors reach this goal by taking advantage of machine learning and statistical techniques to spot the anomalies. There exists many unsupervised network anomaly detectors in the literature. Each algorithm puts forward its good detection performance, therefore it is difficult to select one detector among the large set of available detectors. Therefore, this paper, presents an extensive study and assessment of a set of well known unsupervised network anomaly detectors, and underlines their strengths and weaknesses. This study overwhelms previous similar evaluation by considering for the comparison some new, original and of premier importance parameters as detection similarity, detectors sensitivity and curse of dimensionality, together with the classical detection performance, and execution time parameters.
Outliers are data with anomalous behaviors to other datasets. There are three different types of outliers, namely point anomaly, collective anomaly, and conditional anomaly. Different density-, clustering-, distance-,...
详细信息
ISBN:
(纸本)9781728108728
Outliers are data with anomalous behaviors to other datasets. There are three different types of outliers, namely point anomaly, collective anomaly, and conditional anomaly. Different density-, clustering-, distance-, and distribution-based methods are used to detect outliers. It is obvious that before testing detection algorithms, a dataset that encompasses different types of outliers is required. In this paper an intelligent clustering algorithm is presented to produce a dataset consisting of different outliers. The other important point in this paper is the probability of two uninvestigated types of collective data among datasets that the anomalies are called type I and II. Results show that the proposed algorithm is capable of producing a dataset including different types of outliers. This dataset can be used in all outlier detection techniques. In addition to detection of point anomalies, it can detect all collective anomalies.
暂无评论