the emergence of the Internet of Things (IoT) gadgets and cloud-enabled networks has brought about a dramatic growth in the quantity and kinds of programs that require real-time facet computing offerings. Aspect compu...
详细信息
The integration of solar energy harvesting into small-cell networks is a promising solution for achieving energy-efficient and sustainable wireless communications. However, the inherent variability and intermittency o...
详细信息
Wearable devices have received tremendous interest in healthcare monitoring due to their significant advantages in terms of flexibility, noninvasiveness, wireless capability, and portability. However, they still face ...
详细信息
It is one of the topics that have been studied extensively on maximum power point tracking(MPPT)*** or soft computing methods are used for *** soft computing approaches are more effective than traditional approaches,s...
详细信息
It is one of the topics that have been studied extensively on maximum power point tracking(MPPT)*** or soft computing methods are used for *** soft computing approaches are more effective than traditional approaches,studies on MPPT have shifted in this *** study aims comparison of performance of seven meta-heuristic training algorithms in the neuro-fuzzy training for *** meta-heuristic training algorithms used are particle swarm optimization(PSO),harmony search(HS),cuckoo search(CS),artificial bee colony(ABC)algorithm,bee algorithm(BA),differential evolution(DE)and flower pollination algorithm(FPA).The antecedent and conclusion parameters of neuro-fuzzy are determined by these *** data of a 250 W photovoltaic(PV)is used in the *** effective MPPT,different neuro-fuzzy structures,different membership functions and different control parameter values are evaluated in *** training algorithms are compared in terms of solution quality and convergence *** strengths and weaknesses of these algorithms are *** is seen that the type and number of membership function,colony size,number of generations affect the solution quality and convergence speed of the training *** a result,it has been observed that CS and ABC algorithm are more effective than other algorithms in terms of solution quality and convergence in solving the related problem.
The invention of Phasor Measurement Units(PMUs)produce synchronized phasor measurements with high resolution real time monitoring and control of power system in smart grids that make *** are used in transmitting data ...
详细信息
The invention of Phasor Measurement Units(PMUs)produce synchronized phasor measurements with high resolution real time monitoring and control of power system in smart grids that make *** are used in transmitting data to Phasor Data Concentrators(PDC)placed in control centers for monitoring purpose.A primary concern of system operators in control centers is maintaining safe and efficient operation of the power *** can be achieved by continuous monitoring of the PMU data that contains both normal and abnormal *** normal data indicates the normal behavior of the grid whereas the abnormal data indicates fault or abnormal conditions in power *** a result,detecting anomalies/abnormal conditions in the fast flowing PMU data that reflects the status of the power system is critical.A novel methodology for detecting and categorizing abnormalities in streaming PMU data is presented in this *** proposed method consists of three modules namely,offline Gaussian Mixture Model(GMM),online GMM for identifying anomalies and clustering ensemble model for classifying the *** significant features of the proposed method are detecting anomalies while taking into account of multivariate nature of the PMU dataset,adapting to concept drift in the flowing PMU data without retraining the existing model unnecessarily and classifying the *** proposed model is implemented in Python and the testing results prove that the proposed model is well suited for detection and classification of anomalies on the fly.
This research presents an integrated research framework for electric vehicle charging infrastructures under smart grids. It employs Genetic Algorithms and machine learning models such as Artificial Neural Networks (AN...
详细信息
In the digital area,Internet of Things(IoT)and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal *** IoT networks are popul...
详细信息
In the digital area,Internet of Things(IoT)and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal *** IoT networks are popular and widely employed in real world applications,security in IoT networks remains a challenging *** intrusion detection systems(IDS)cannot be employed in IoT networks owing to the limitations in resources and ***,this paper concentrates on the design of intelligent metaheuristic optimization based feature selection with deep learning(IMFSDL)based classification model,called IMFSDL-IDS for IoT *** proposed IMFSDL-IDS model involves data collection as the primary process utilizing the IoT devices and is preprocessed in two stages:data transformation and data *** manage big data,Hadoop ecosystem is ***,the IMFSDL-IDS model includes a hill climbing with moth flame optimization(HCMFO)for feature subset selection to reduce the complexity and increase the overall detection ***,the beetle antenna search(BAS)with variational autoencoder(VAE),called BAS-VAE technique is applied for the detection of intrusions in the feature reduced *** BAS algorithm is integrated into the VAE to properly tune the parameters involved in it and thereby raises the classification *** validate the intrusion detection performance of the IMFSDL-IDS system,a set of experimentations were carried out on the standard IDS dataset and the results are investigated under distinct *** resultant experimental values pointed out the betterment of the IMFSDL-IDS model over the compared models with the maximum accuracy 95.25%and 97.39%on the applied NSL-KDD and UNSW-NB15 dataset correspondingly.
Internet of Things (IoT) is a network to connect anything with the Internet. While its purpose is to provide efficient and effective solutions, security of the network devices is a challenging issue. Therefore, securi...
详细信息
A secure encryption scheme for color images based on channel fusion and spherical diffraction is proposed in this paper. In the proposed encryption scheme, a channel fusion technology based on the discrete wavelet tra...
详细信息
A secure encryption scheme for color images based on channel fusion and spherical diffraction is proposed in this paper. In the proposed encryption scheme, a channel fusion technology based on the discrete wavelet transformation is used to transform color images into single-channel grayscale images, firstly. In the process of transformation, the hyperchaotic system is used to permutate and diffuse the information of red–green–blue(RGB) channels to reduce the correlation of channels. Then the fused image is encrypted by spherical diffraction transform. Finally, the complex-valued diffraction result is decomposed into two real parts by the improved equal module decomposition, which are the ciphertext and the private key. Compared with the traditional color image encryption schemes that encrypt RGB channels separately, the proposed scheme is highly secure and robust.
The need for drinking water is very essential in today's world. The government has been adopting a variety of measures to save drinking water and spend it economically. It is everyone's duty to save water and ...
详细信息
暂无评论