Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
This paper proposes a distribution locational marginal pricing(DLMP) based bi-level Stackelberg game framework between the internet service company(ISC) and distribution system operator(DSO) in the data center park. T...
详细信息
This paper proposes a distribution locational marginal pricing(DLMP) based bi-level Stackelberg game framework between the internet service company(ISC) and distribution system operator(DSO) in the data center park. To minimize electricity costs, the ISC at the upper level dispatches the interactive workloads(IWs) across different data center buildings spatially and schedules the battery energy storage system temporally in response to DLMP. Photovoltaic generation and static var generation provide extra active and reactive power. At the lower level, DSO calculates the DLMP by minimizing the total electricity cost under the two-part tariff policy and ensures that the distribution network is uncongested and bus voltage is within the limit. The equilibrium solution is obtained by converting the bi-level optimization into a single-level mixed-integer second-order cone programming optimization using the strong duality theorem and the binary expansion method. Case studies verify that the proposed method benefits both the DSO and ISC while preserving the privacy of the ISC. By taking into account the uncertainties in IWs and photovoltaic generation, the flexibility of distribution networks is enhanced, which further facilitates the accommodation of more demand-side resources.
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
As more and more data is produced,finding a secure and efficient data access structure has become a major research *** centralized systems used by medical institutions for the management and transfer of Electronic Med...
详细信息
As more and more data is produced,finding a secure and efficient data access structure has become a major research *** centralized systems used by medical institutions for the management and transfer of Electronic Medical Records(EMRs)can be vulnerable to security and privacy threats,often lack interoperability,and give patients limited or no access to their own *** this paper,we first propose a privilege-based data access structure and incorporates it into an attribute-based encryption mechanism to handle the management and sharing of big data *** proposed privilege-based data access structure makes managing healthcare records using mobile healthcare devices efficient and feasible for large numbers of *** then propose a novel distributed multilevel EMR(d-EMR)management scheme,which uses blockchain to address security concerns and enables selective sharing of medical records among staff members that belong to different levels of a hierarchical *** deploy smart contracts on Ethereum blockchain and utilize a distributed storage system to alleviate the dependence on the record-generating institutions to manage and share patient *** preserve privacy of patient records,our smart contract is designed to allow patients to verify attributes prior to granting access *** provide extensive security,privacy,and evaluation analyses to show that our proposed scheme is both efficient and practical.
This innovative practice full paper describes an innovative pedagogical framework that integrates community engaged learning and social justice principles into a traditional web development course, fostering a holisti...
详细信息
Energy efficiency has emerged as a critical concern in Wireless Sensor Networks (WSN). Sensor nodes deplete their energy faster and die earlier making whole network unstable due to poor clustering in the network. Ther...
详细信息
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuse...
详细信息
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuses throughthe analysis ofWi-Fi signals emanating frompassengers’mobile *** study seeks to scrutinize the reliability of digital Wi-Fi environments in predicting bus occupancy levels,thereby addressing a crucial aspect of public *** proposed system comprises three crucial elements:Signal capture,data filtration,and the calculation and estimation of passenger *** pivotal findings reveal that the system demonstrates commendable accuracy in estimating passenger counts undermoderate-crowding conditions,with an average deviation of 20%from the ground truth and an accuracy rate ranging from 90%to 100%.This underscores its efficacy in scenarios characterized by moderate levels of ***,in densely crowded conditions,the system exhibits a tendency to overestimate passenger numbers,occasionally doubling the actual *** acknowledging the need for further research to enhance accuracy in crowded conditions,this study presents a pioneering avenue to address a significant concern in public *** implications of the findings are poised to contribute substantially to the enhancement of bus operations and service quality.
The maximum power transfer capability (MPTC) of phase-locked loop (PLL)-based grid-following inverters is often limited under weak-grid conditions due to passivity violations caused by operating-point-dependent contro...
详细信息
The accurate, extended period prediction of individual customer energy consumption is critical for utility providers. Machine learning techniques, particularly neural networks, have proven effective in predicting hous...
详细信息
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other ...
详细信息
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other through hand *** of hand gestures has become an important challenge for the recognition of sign *** are many existing models that can produce a good accuracy,but if the model test with rotated or translated images,they may face some difficulties to make good performance *** resolve these challenges of hand gesture recognition,we proposed a Rotation,Translation and Scale-invariant sign word recognition system using a convolu-tional neural network(CNN).We have followed three steps in our work:rotated,translated and scaled(RTS)version dataset generation,gesture segmentation,and sign word ***,we have enlarged a benchmark dataset of 20 sign words by making different amounts of Rotation,Translation and Scale of the ori-ginal images to create the RTS version *** we have applied the gesture segmentation *** segmentation consists of three levels,i)Otsu Thresholding with YCbCr,ii)Morphological analysis:dilation through opening morphology and iii)Watershed ***,our designed CNN model has been trained to classify the hand gesture as well as the sign *** model has been evaluated using the twenty sign word dataset,five sign word dataset and the RTS version of these *** achieved 99.30%accuracy from the twenty sign word dataset evaluation,99.10%accuracy from the RTS version of the twenty sign word evolution,100%accuracy from thefive sign word dataset evaluation,and 98.00%accuracy from the RTS versionfive sign word dataset ***,the influence of our model exists in competitive results with state-of-the-art methods in sign word recognition.
暂无评论