A stochastic multi-stage portfolio model for a hydropower producer operating in a competitive electricity market is proposed. The portfolio includes its own production and a set of forward contracts for future deliver...
详细信息
A stochastic multi-stage portfolio model for a hydropower producer operating in a competitive electricity market is proposed. The portfolio includes its own production and a set of forward contracts for future delivery or purchase of electricity to hedge against risks. The goal of using such a model is to maximise the profit of the producer and reduce the economic risks connected to the fact that energy spot and forward prices are highly volatile. Our findings show that the use of forward contracts for hedging purposes results in a risk reduction and in a more efficient use of the hydroplant, taking advantage of the possibility of pumping water and ending up with a higher final value of the reservoi.
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination ...
详细信息
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are desig...
详细信息
In this paper, the stabilization problems of a class of new hyperchaotic systems with fully unknown parameters are concerned. Based on the adaptive control idea, two novel adaptive state feedback controllers are designed to implement the asymptotic stabilization of this kind of new hyperchaotic system by choosing appropriate controller structure and parametric updating law, respectively. The effectiveness of the proposed adaptive control method is verified by simulation results.
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables ...
详细信息
This paper considers the generalized synchronization problems of two different hyperchaotic systems with unknown parameters. By denoting the synchronization error signals as the difference between the state variables of the drive system and the state variables of the response system, the hyperchaotic synchronization problem is transformed into the stabilization control problem of the origin of the synchronization error system. Based on the Lyapunov stability, a new adaptive synchronization controller is designed and the asymptotic stability of the origin of the synchronization error system is proved, simulation results illustrate the correctness of the proposed generalized synchronization method.
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as ec...
详细信息
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all solution model. Such IDS is not as economically sustainable for all organizations. Furthermore, studies have found that Recurrent Neural Network out-performs Feed-forward Neural Network, and Elman Network. This paper, therefore, proposes a scalable application-based model for detecting attacks in a communication network using recurrent neural network architecture. Its suitability for online real-time applications and its ability to self-adjust to changes in its input environment cannot be over-emphasized.
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a pe...
详细信息
In order to ensure every feasible assembly sequence is included in the searching space of genetic algorithm, this paper proposes an improved genetic encoding method. In this method, every chromosome is encoded by a permutation of integer. Although the final form of chromosome is the same as the existing form, the decoding process is different. In our decoding process, every permutation of integer is transformed into an ordered set of all edges in the stability-directed graph, and then the ordered set of edges is transform into an ordered set of assembly states. The correctness of this method is proved, the combination of this method and the existing genetic algorithm is discussed, and an example is presented to show the effectiveness of our encoding method.
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered dis...
详细信息
The chaotic suppression problem for a class of typical discrete-time hyperchaotic systems is investigated in this paper. A T-S fuzzy model-based control method is employed to eliminate hyperchaos in the considered discrete-time system. Firstly, the T-S fuzzy representation for the discrete-time hyperchaotic system is presented. Then, a state feedback controller is designed based on the parallel distributed compensation technique. According to the linear matrix inequality method and exact linearization technique, two kinds of approaches are given to solve the controller gain matrices. Finally, the validity of the proposed chaotic suppression method is illustrated by a numerical example.
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p...
详细信息
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering privacy and confidentiality, etc. To describe the uncertainty in data, probabilistic approaches are widely used among other approaches. This paper gives a survey study on some probabilistic approaches in database fields as well as in semi-structured datasets, especially in XML datasets.
In this paper sensitivity analysis is adopted in order to understand the randomness of a stochastic second order cone program for mobile ad hoc networks [3]. The algorithm looks for a destination node and sets up a ro...
详细信息
In this paper sensitivity analysis is adopted in order to understand the randomness of a stochastic second order cone program for mobile ad hoc networks [3]. The algorithm looks for a destination node and sets up a route by means of the expected zone, the region where the sender node expects to find the destination node and the requested zone defined by the sender node for spreading the route request to the destination node. Sensitivity analysis is performed by considering different costs of flooding and latency penalty. Evaluation of EVPI and VSS [2]-[4] allows us to find the range of values in which it is safe to save time by using a deterministic approach instead of a stochastic one.
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the q...
详细信息
Link spam refers to unfairly gaining a high ranking on search engines for a web page by means of trickily manipulating the link graph to confuse the hyper-link structure analysis algorithms. It seriously affects the quality of the search engine query results. Detecting link spam has become a big challenge for web search. This paper proposes to learn a discriminant function to detect link spam by genetic programming. In this article, the representation of individuals, the genetic operators and the fitness function are studied. The experiments on WEBSPAM-UK2006 are carried out to find the preferable parameters and evaluate the validity of genetic programming. The experimental results show that this method can improve spam classification recall by 27.5%, F-measure by 12.1% and accuracy by 4.6% compared with SVM.
暂无评论