Context Space Theory (CST) is a geometrical approach used to represent contexts and situations in situation-aware computing applications. In this theory, situations are represented in a multidimensional space, where e...
详细信息
Demand side management (DSM) applications rely on the exchange of load profiles to effectively manage the operation of energy systems. However, sharing detailed energy profile data raises substantial privacy concerns,...
详细信息
The increasing adoption of electric vehicles (EVs) necessitates the efficient management of large EV parking facilities to prevent them from exceeding grid capacity and to improve the overall user experience. This pap...
详细信息
The widespread increase of photovoltaic panels in the distribution grid often leads to overvoltage. Traditional voltage regulation techniques are unfair for prosumers at the sensitive part of the grid due to larger po...
详细信息
The paper presents a physics-informed Gaussian/kernel process regression method for real-time state estimation and forecasting of the phase angle, angular speed, and mechanical wind power in a three-generator power gr...
详细信息
The rapid growth in Electric Vehicle (EV) adoption poses substantial challenges to residential energy infrastructures, especially in terms of the strain it places on local grids during charging. This paper proposes an...
详细信息
Uncovering the mathematical structure of unknown chaotic systems from limited time series data poses a significant challenge in the field of dynamical systems, with broad applications across various domains. In this p...
详细信息
Tooth segmentation is a vital task in medical image analysis aimed at extracting and delineating tooth structures from computed tomography scans. This process plays a crucial role in various clinical applications, inc...
详细信息
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent...
详细信息
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the NOMA system. More specifically, the multi-hop transmission can extend the coverage of wireless transmission. However, accordin...
详细信息
暂无评论