With the increasing penetration of photovoltaic (PV) systems posing challenges to power system stability, this paper investigates the effectiveness of grid-forming controlled PV systems in providing frequency ancillar...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human ***,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN *** findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy *** investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)***,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application ***,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
Inadequate rainfall causes reduced harvesting, reduced availability of water, economic losses, environmental degradation, public health problems, decreased power generation, social unrest, and infrastructure destructi...
详细信息
By enabling a highly accurate examination of the chest x-ray, deep learning, for example, is changing the methods of recognizing lung disorders. In order to classify lung diseases, such as bacterial pneumonia, viral p...
详细信息
Digital signal processing of electroencephalography(EEG)data is now widely utilized in various applications,including motor imagery classification,seizure detection and prediction,emotion classification,mental task cl...
详细信息
Digital signal processing of electroencephalography(EEG)data is now widely utilized in various applications,including motor imagery classification,seizure detection and prediction,emotion classification,mental task classification,drug impact identification and sleep state *** the increasing number of recorded EEG channels,it has become clear that effective channel selection algorithms are required for various *** Whale Optimization Method(Guided WOA),a suggested feature selection algorithm based on Stochastic Fractal Search(SFS)technique,evaluates the chosen subset of *** may be used to select the optimum EEG channels for use in Brain-computer Interfaces(BCIs),the method for identifying essential and irrelevant characteristics in a dataset,and the complexity to be *** enables(SFS-Guided WOA)algorithm to choose the most appropriate EEG channels while assisting machine learning classification in its tasks and training the classifier with the ***(SFSGuided WOA)algorithm is superior in performance metrics,and statistical tests such as ANOVA and Wilcoxon rank-sum are used to demonstrate this.
The proliferation of Internet of Things (IoT) networks has significantly increased the complexity of software architectures, leading to heightened vulnerabilities and system inefficiencies. AI-infused Predictive Digit...
详细信息
The ability to detect cardiac disease early is vital to saving lives. Heart attacks are one of the leading reasons for high death rates worldwide due to the high cost of identifying cardiac disorders, which is crucial...
详细信息
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to the increased attack surface and the inherent vulnerabilities of interconnected systems. This paper proposes ...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console *** the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also *** leads researchers worldwide to work on developing effective Intrusion Detection systems(IDS)for IoT infrastructure against any malicious ***,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is *** data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT ***,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT *** is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient ***,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion *** performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed *** experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed *** addition,the proposed work accomplishes high performance compared to other recent rela
This paper analyses an electrification strategy for a depot for a public transport company, through an optimized model. The case study analyses both the transition of a depot able to host 10 buses towards e-buses and ...
详细信息
暂无评论