Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of hete...
详细信息
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies,along with data processing and advanced *** main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information *** original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI ***,an AdaBelief Exponential Feature Selection(AEFS)technique is used to efficiently handle the input huge datasets from the smart grid for boosting ***,a Kernel based Extreme Neural Network(KENN)technique is used to anticipate security vulnerabilities more *** Polar Bear Optimization(PBO)algorithm is used to efficiently determine the parameters for the estimate of radial basis ***,several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection-Kernel based Extreme Neural Network(AEFS-KENN)big data security *** results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5%with precision and AUC of 99%for all smart grid big datasets used in this study.
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ...
详细信息
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown machine device in the network is estimated using the relative distances between blind machines(BMs)and anchor machines(AMs).Moreover,a more practical and challenging scenario with the erroneous position of AM is considered,which brings additional uncertainty to the final position ***,the AMs selection algorithm for the localisation of BMs in the IIoT network is *** those AMs will participate in the localisation process,which increases the accuracy of the final location ***,the closed‐form expression of the proposed greedy successive anchorization process is derived,which prevents possible local convergence,reduces computation,and achieves Cramér‐Rao lower bound accuracy for white Gaussian measurement *** results are compared with the state‐of‐the‐art and verified through numerous simulations.
Decentralized applications leveraging blockchain technology are gaining widespread adoption within the decentralized applications ecosystem. Interoperability, a fundamental concept facilitating seamless data and proce...
详细信息
作者:
Liawatimena, SuryadiputraGunawan, DevinaBina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Computer Science Deparment BINUS Graduate Program Master of Computer Science Jakarta11480 Indonesia Bina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Jakarta11480 Indonesia
Modern retail businesses face a significant challenge with the inefficiency of manually changing price labels on shelves. This manual process not only consumes valuable time and resources but also increases the likeli...
详细信息
The capacity to generalize to future unseen data stands as one of the utmost crucial attributes of deep neural networks. Sharpness-Aware Minimization (SAM) aims to enhance the generalizability by minimizing worst-case...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From
The distributed data infrastructure in Internet of Things (IoT) ecosystems requires efficient data-series compression methods, as well as the capability to meet different accuracy demands. However, the compression per...
详细信息
This paper presents sufficient conditions for the stability and 2-gain performance of recurrent neural networks (RNNs) with ReLU activation functions. These conditions are derived by combining Lyapunov/dissipativity t...
详细信息
In the field of adversarial games, existing decision-making algorithms primarily rely on reinforcement learning, which can theoretically adapt to diverse scenarios through trial and error. However, these algorithms of...
详细信息
作者:
Keivan, DarioushSeiler, PeterDullerud, GeirBin, H.
University of Illinois at Urbana-Champaign Department of Mechanical Science & Engineering United States University of Michigan
Department of Electrical Engineering and Computer Science United States
University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering United States
Policy optimization has gained renewed attention from the control community, serving as a pivotal link between control theory and reinforcement learning. In the past few years, the global convergence theory of direct ...
详细信息
暂无评论