Brain-Machine Interfaces (BMIs) offer significant promise for enabling paralyzed individuals to control external devices using their brain signals. One challenge is that during the online Brain Control (BC) process, s...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
In this paper, we delve into the transformative landscape of education amidst the disruptive advances of generative AI (GenAI), characterized by an unprecedented capacity to generate new information with tools such as...
详细信息
Traditional Global Positioning System(GPS)technology,with its high power consumption and limited perfor-mance in obstructed environments,is unsuitable for many Internet of Things(IoT)*** paper explores LoRa as an alte...
详细信息
Traditional Global Positioning System(GPS)technology,with its high power consumption and limited perfor-mance in obstructed environments,is unsuitable for many Internet of Things(IoT)*** paper explores LoRa as an alternative localization technology,leveraging its low power consumption,robust indoor penetration,and extensive coverage area,which render it highly suitable for diverse IoT *** comprehensively review several LoRa-based localization techniques,including time of arrival(ToA),time difference of arrival(TDoA),round trip time(RTT),received signal strength indicator(RSSI),and fingerprinting *** this review,we evaluate the strengths and limitations of each technique and investigate hybrid models to potentially improve positioning *** studies in smart cities,agriculture,and logistics exemplify the versatility of LoRa for indoor and outdoor *** findings demonstrate that LoRa technology not only overcomes the limitations of GPS regarding power consumption and coverage but also enhances the scalability and efficiency of IoT deployments in complex environments.
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT...
详细信息
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)*** the emergence of IoT-based services,the industry of internet-based devices has *** number of these devices has raised from millions to billions,and it is expected to increase further in the near ***,additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user *** data aggregation models for Fog enabled IoT environ-ments possess high computational complexity and communication ***-fore,in order to resolve the issues and improve the lifetime of the network,this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer(HDAG-CBMO)*** HDAG-CBMO technique derives afitness function from many relational matrices,like residual energy,average distance to neighbors,and centroid degree of target ***,a chaotic theory based population initialization technique is derived for the optimal initial position of ***,a learning based data offloading method has been developed for reducing the response time to IoT user requests.A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks.
The main role of Automatic Generation Control (AGC) is to maintain power grids frequency within specified operating limits. Due to the fact that AGC is the sole automatic feedback control loop between physical and cyb...
详细信息
Scalable coordination of photovoltaic(PV)inverters,considering the uncertainty in PV and load in distribution networks(DNs),is challenging due to the lack of real-time *** PV inverter setpoints can be achieved to addr...
详细信息
Scalable coordination of photovoltaic(PV)inverters,considering the uncertainty in PV and load in distribution networks(DNs),is challenging due to the lack of real-time *** PV inverter setpoints can be achieved to address this issue by capitalizing on the abundance of data from smart utility meters and the scalable architecture of artificial neural networks(ANNs).To this end,we first use an offline,centralized data-driven conservative convex approximation of chance-constrained optimal power flow(CVaR-OPF)in which conditional value-at-risk(CVaR)is used to compute reactive power setpoints of PV inverter,taking into account PV and load uncertainties in *** that,an artificial neural network(ANN)controller is trained for each PV inverter to emulate the optimal behavior of the centralized control setpoints of PV inverter in a decentralized ***,the voltage regulation performance of the developed ANN controllers is compared with other decentralized designs(local controllers)developed using model-based learning(regressionbased controller),optimization(affine feedback controller),and case-based learning(mapping)*** tests using real-world feeders corroborate the effectiveness of ANN controllers in voltage regulation and loss minimization.
This paper considers a free space optical (FSO) cooperative network with an energy harvesting (EH) relay with no permanent power supply. The relay implements the harvest-store-use strategy and, in addition to the ener...
详细信息
This paper presents a machine-learning-based speedup strategy for real-time implementation of model-predictive-control(MPC)in emergency voltage stabilization of power *** success in various applications,real-time impl...
详细信息
This paper presents a machine-learning-based speedup strategy for real-time implementation of model-predictive-control(MPC)in emergency voltage stabilization of power *** success in various applications,real-time implementation of MPC in power systems has not been successful due to the online control computation time required for large-sized complex systems,and in power systems,the computation time exceeds the available decision time used in practice by a large *** long-standing problem is addressed here by developing a novel MPC-based framework that i)computes an optimal strategy for nominal loads in an offline setting and adapts it for real-time scenarios by successive online control corrections at each control instant utilizing the latest measurements,and ii)employs a machine-learning based approach for the prediction of voltage trajectory and its sensitivity to control inputs,thereby accelerating the overall control computation by multiple ***,a realistic control coordination scheme among static var compensators(SVC),load-shedding(LS),and load tap-changers(LTC)is presented that incorporates the practical delayed actions of the *** performance of the proposed scheme is validated for IEEE 9-bus and 39-bus systems,with±20%variations in nominal loading conditions together with *** show that our proposed methodology speeds up the online computation by 20-fold,bringing it down to a practically feasible value(fraction of a second),making the MPC real-time and feasible for power system control for the first time.
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
暂无评论