Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the...
详细信息
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the MSS method suffers from a slow convergence rate or even divergence under some circumstances,a least-squares-based iterative(LSI)method is *** with the MSS method,the LSI method modifies the iterative variables in each iteration by solving a least-squares problem with the information in previous iterations.A practical implementation and a parameter tuning strategy for the LSI method are ***,a LSI-PF method is proposed to solve I-T&D power flow and a LSIheterogeneous decomposition(LSI-HGD)method is proposed to solve optimal power *** experiments demonstrate that the proposed LSI-PF and LSI-HGD methods can achieve the same accuracy as the benchmark ***,these LSI methods,with appropriate settings,significantly enhance the convergence and efficiency of conventional ***,in some cases,where conventional methods diverge,these LSI methods can still converge.
This paper aims to develop a novel robust multi-dialect end-to-end ASR system with beam search threshold pruning. The efficacy of our proposed model is evaluated using word error rate (WER). Our key contributions are:...
详细信息
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
The research presents a new efficient machine learning method to classify brain tumors because this task remains vital in fighting the high incidence of brain cancers. The proposed approach unites all its operations i...
详细信息
State-space graphs and automata serve as fundamental tools for modeling and analyzing the behavior of computational systems. Recurrent neural networks (RNNs) and language models are deeply intertwined, as RNNS provide...
详细信息
This paper introduces an analog multi-channel millimeter-wave transceiver architecture that offers advantages in terms of low hardware complexity and computational efficiency compared to digital beamforming and hybrid...
详细信息
This letter develops a fast analytical method for uncertainty quantification of electromechanical oscillation frequency due to varying generator dampings. By employing the techniques of matrix determinant reduction, t...
详细信息
This letter develops a fast analytical method for uncertainty quantification of electromechanical oscillation frequency due to varying generator dampings. By employing the techniques of matrix determinant reduction, two types of uncertainty analysis are investigated to quantify the impact of the generator damping on electromechanical oscillation frequency, i.e., interval analysis and probabilistic analysis. The proposed analytical frequency estimation formula is verified against conventional methods on two transmission system models. Then, Monte Carlo experiments and interval analysis are respectively conducted to verify the established lower/upper bound formulae and probability distribution formulae. Results demonstrate the accuracy and speed of the proposed method.
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
This article addresses the velocity-free predefined-time consensus tracking for multiagent systems (MASs) with input and output quantization via adaptive sliding mode control (SMC). First, a distributed predefined-tim...
详细信息
暂无评论