Numerical analysis of few-atom cavity quantum electrodynamics (QED) is challenging due to the exponentially scaling size of the Hilbert space when multiple quantized electromagnetic modes are considered. To overcome t...
详细信息
Flow-based microfluidic biochips (FMBs) have microvalves as key components. The physical characteristics of the microvalves vary instance-to-instance due to the inherent variability of numerous fabrication parameters....
详细信息
This paper proposes a novel cost-reflective and computationally efficient method for allocating distribution network costs to residential customers. First, the method estimates the growth in peak demand with a 50% pro...
详细信息
ISBN:
(数字)9798350377941
ISBN:
(纸本)9798350377958
This paper proposes a novel cost-reflective and computationally efficient method for allocating distribution network costs to residential customers. First, the method estimates the growth in peak demand with a 50% probability of exceedance (50POE) and the associated network augmentation costs using a probabilistic long-run marginal cost computation based on the Turvey perturbation method. Second, it allocates these costs to customers on a cost-causal basis using the Shapley value solution concept. To overcome the intractability of the exact Shapley value computation for real-world applications, we implement a fast, scalable and efficient clustering technique based on customers’ peak demand contribution, which drastically reduces the Shapley value computation time. Using customer load traces from an Australian smart grid trial (Solar Home Electricity Data), we demonstrate the efficacy of our method by comparing it with established energy-and peak demand-based cost allocation approaches.
In the search for a simple and scalable firmware solution for Internet of Things (IoT) applications on devices with significant constraints, such as limited energy, hardware resources, and cost, numerous well-recommen...
详细信息
The substring edit error replaces a substring u of x with another string v, where the lengths of u and v are bounded by a given constant k. It encompasses localized insertions, deletions, and substitutions within a wi...
详细信息
In this paper, we present a novel neighbor discovery method for a wireless ad hoc network where each node is equipped with a Free-Space-Optical (FSO) transceivers capable of electronic beam switching. Directional neig...
详细信息
Various software and systems engineering scenarios rely on the systematic construction of consistent graph models. However, automatically generating a diverse set of consistent graph models for complex domain specific...
详细信息
As one of the most essential accessories, headsets have been widely used in common online conversations. The metal coil vibration patterns of headset speakers/microphones have been proven to be highly correlated with ...
详细信息
Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced...
详细信息
Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced Encryption Standard(AES)***,the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit(LSB)watermarking *** that,the encrypted secret medical image with the secret report is concealed in a cover medical image,using Kekre’s Median Codebook Generation(KMCG)***,the stego-image obtained is split into 16 ***,it is sent to the *** adopt this strategy to send the secret medical image and report over a network *** proposed technique is assessed with different encryption quality metrics including Peak Signal-to-Noise Ratio(PSNR),Correlation Coefficient(Cr),Fea-ture Similarity Index Metric(FSIM),and Structural Similarity Index Metric(SSIM).Histogram estimation is used to confirm the matching between the secret medical image before and after *** results demonstrate that the proposed technique achieves good performance with high quality of the received medical image and clear image details in a very short processing time.
The evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption h...
详细信息
暂无评论