This paper explores the capability of various machine learning algorithms, including Random Forest and advanced gradient boosting techniques such as XGBoost, LightGBM, and CatBoost, to predict customer churn in the te...
详细信息
The fridge is the most constantly employed menage/ kitchen electrical device encyclopedically for conserving food. The leading sectors of smart widgets include refrigerators in the kitchen. The Web of Effects (IoT) de...
详细信息
A voltage security region(VSR)is a powerful tool for monitoring the voltage security in bulk power grids with high penetration of *** can prevent cascading failures in wind power integration areas caused by serious ov...
详细信息
A voltage security region(VSR)is a powerful tool for monitoring the voltage security in bulk power grids with high penetration of *** can prevent cascading failures in wind power integration areas caused by serious over or low voltage *** bottlenecks of a VSR for practical applications are computational efficiency and *** bridge these gaps,a general optimization model for tracking a voltage security region boundary(VSRB)in bulk power grids is developed in this paper in accordance with the topological characteristics of the ***,the initial VSRB point on the VSRB is examined with the traditional OPF by using the base case parameters as initial ***,the rest of the VSRB points on the VSRB are tracked one after another,with the proposed optimization model,by using the parameters of the tracked VSRB point as the initial value to explore its adjacent VSRB *** proposed approach can significantly improve the computational efficiency of the VSRB tracking over the existing algorithms,and case studies,in the WECC 9-bus and the Polish 2736-bus test systems,demonstrate the high accuracy and efficiency of the proposed approach on exploring the VSRB.
Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many logic locking techniques have been proven to be broken. The state-of...
详细信息
Power systems are moving toward a low-carbon or carbon-neutral future where high penetration of renewables is *** conventional fossil-fueled synchronous generators in the transmission network being replaced by renewab...
详细信息
Power systems are moving toward a low-carbon or carbon-neutral future where high penetration of renewables is *** conventional fossil-fueled synchronous generators in the transmission network being replaced by renewable energy generation which is highly distributed across the entire grid,new challenges are emerging to the control and stability of large-scale power *** analysis and control methods are needed for power systems to cope with the ongoing *** the CSEE JPES forum,six leading experts were invited to deliver keynote speeches,and the participating researchers and professionals had extensive exchanges and discussions on the control and stability of power ***,potential changes and challenges of power systems with high penetration of renewable energy generation were introduced and explained,and advanced control methods were proposed and analyzed for the transient stability enhancement of power grids.
Multi-agent cyber-physical systems are present in a variety of applications. Agent decision-making can be affected due to errors induced by uncertain, dynamic operating environments or due to incorrect actions taken b...
详细信息
Emergency lighting systems are an essential component of building safety infrastructure and play a critical role in ensuring the safety of people during power outages or other emergencies. As energy efficiency and env...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
暂无评论