Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the...
详细信息
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the MSS method suffers from a slow convergence rate or even divergence under some circumstances,a least-squares-based iterative(LSI)method is *** with the MSS method,the LSI method modifies the iterative variables in each iteration by solving a least-squares problem with the information in previous iterations.A practical implementation and a parameter tuning strategy for the LSI method are ***,a LSI-PF method is proposed to solve I-T&D power flow and a LSIheterogeneous decomposition(LSI-HGD)method is proposed to solve optimal power *** experiments demonstrate that the proposed LSI-PF and LSI-HGD methods can achieve the same accuracy as the benchmark ***,these LSI methods,with appropriate settings,significantly enhance the convergence and efficiency of conventional ***,in some cases,where conventional methods diverge,these LSI methods can still converge.
This paper aims to develop a novel robust multi-dialect end-to-end ASR system with beam search threshold pruning. The efficacy of our proposed model is evaluated using word error rate (WER). Our key contributions are:...
详细信息
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
This letter develops a fast analytical method for uncertainty quantification of electromechanical oscillation frequency due to varying generator dampings. By employing the techniques of matrix determinant reduction, t...
详细信息
This letter develops a fast analytical method for uncertainty quantification of electromechanical oscillation frequency due to varying generator dampings. By employing the techniques of matrix determinant reduction, two types of uncertainty analysis are investigated to quantify the impact of the generator damping on electromechanical oscillation frequency, i.e., interval analysis and probabilistic analysis. The proposed analytical frequency estimation formula is verified against conventional methods on two transmission system models. Then, Monte Carlo experiments and interval analysis are respectively conducted to verify the established lower/upper bound formulae and probability distribution formulae. Results demonstrate the accuracy and speed of the proposed method.
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
Electromagnetic radiation (EMR) exposure from fifth-generation (5G) mobile technology influences human health. This article proposes a numerical analysis to investigate the specific absorption rate (SAR) using an anat...
详细信息
Electromagnetic radiation (EMR) exposure from fifth-generation (5G) mobile technology influences human health. This article proposes a numerical analysis to investigate the specific absorption rate (SAR) using an anatomical human head and accurate dipole model to examine the EMR effect at 700 MHz, a low-band frequency for 5G mobile communication. A three-dimensional (3D) digital model of a realistic human head is reconstructed using a series of magnetic resonance imaging (MRI) scans. This model encompasses various tissue types with their respective bio-material properties. The radiation from a mobile terminal is modeled using a dipole-based structure. In this study, the Unsplit-Field Finite-Difference Time-Domain (UF-FDTD) algorithm is modified for numerical analysis, with a perfectly matched layer (PML) serving as the boundary condition. The electromagnetic (EM) simulation is conducted to study the interaction between the two computational objects in the artificial absorbing environment. The Yee cell is utilized for a structured lattice in the UF-FDTD approach, characterized by its uniformity and consistent application throughout the model. The research problem involves correlating the size of the human head model with the unit cell size, which is associated with the average weight of the human brain for adults. The Yee cell is optimized based on the Courant-Friedrichs-Lewy (CFL) condition. This work enhances simulation accuracy twofold. First, the optimization of the unit cell size relative to the wavelength is refined in comparison to other unit cells without a phase error. This optimization leads to an accurate time-step parameter via the CFL criterion, ensuring the stability of the computer simulation. Second, the optimized grid structure of the UF-FDTD algorithm closely approximates the infinitesimal feeding gap, ensuring precise alignment with the exact dimensions of the feed-gap point in the dipole antenna configuration and accurately reflecting the effects
This article addresses the velocity-free predefined-time consensus tracking for multiagent systems (MASs) with input and output quantization via adaptive sliding mode control (SMC). First, a distributed predefined-tim...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n...
详细信息
暂无评论