The Internet of Things (IoT) stands out as one of the most captivating technologies of the current decade. Its ability to connect people and things anytime and anywhere has led to its rapid expansion and numerous impa...
详细信息
Concerns related to the proliferation of automated face recognition technology with the intent of solving or preventing crimes continue to mount. The technology being implicated in wrongful arrest following 1-to-many ...
详细信息
Learning from unlabeled data or self-learning, can substantially reduce the complexity of machine learning (ML) utilization in real-time deployment. While the development of un/semisupervised algorithms shows promisin...
详细信息
Contingency analysis is an important building block in the stability and reliability analysis of power grid operations. However, due to the large number of transmission lines,in practice only a limited number of conti...
详细信息
Contingency analysis is an important building block in the stability and reliability analysis of power grid operations. However, due to the large number of transmission lines,in practice only a limited number of contingencies could be evaluated. This paper proposes a graph theory based N-1 contingency selection method to effectively identify the most critical contingencies, which can be used in security-constrained unit commitment(SCUC) problems to derive secure and economic operation decisions of the power grid. Specifically, the power flow transferring path identification algorithm and the vulnerability index are put forward to rank individual contingencies according to potential transmission line overloads. Effectiveness of the proposed N-1 contingency selection method is quantified by applying the corresponding SCUC solution to the full N-1 security evaluation, i. e., quantifying total post-contingency generation-load imbalance in all N-1 contingencies. Numerical results on several benchmark IEEE systems, including5-bus, 24-bus, and 118-bus systems, show effectiveness of the proposed method. Compared with existing contingency selection methods which usually resort to full power flow calculations,the proposed method relies on power gird topology to effectively identify critical contingencies for facilitating the optimal scheduling of SCUC problems.
V2X (Vehicle-to-everything) communication relies on short messages for short-range transmissions over a fading wireless channel, yet requires high reliability and low latency. Hard-decision decoding sacrifices the pre...
详细信息
V2X (Vehicle-to-everything) communication relies on short messages for short-range transmissions over a fading wireless channel, yet requires high reliability and low latency. Hard-decision decoding sacrifices the preservation of diversity order, leading to pronounced performance degradation in fading channels. By contrast, soft-decision decoding retains diversity order, albeit at the cost of increased computational complexity. We introduce a novel enhanced hard-decision decoder termed as the Diversity Flip decoder (DFD) designed for preserving the diversity order. Moreover, it exhibits ‘universal’ applicability to all linear block codes. For a $\mathscr {C}(n,k)$ code having a minimum distance ${d_{\min }}$, the proposed decoder incurs a worst-case complexity order of $2^{({d_{\min }}-1)}-1$. Notably, for codes having low ${d_{\min }}$, this complexity represents a significant reduction compared to the popular soft and hard decision decoding algorithms. Due to its capability of maintaining diversity at a low complexity, it is eminently suitable for applications such as V2X (Vehicle-to-everything), IoT (Internet of Things), mMTC (Massive Machine type Communications), URLLC (Ultra-Reliable Low Latency Communications) and WBAN (Wireless Body Area Networks) for efficient decoding with favorable performance characteristics. The simulation results provided for various known codes and decoding algorithms validate the performance versus complexity benefits of the proposed decoder. Authors
In recent years, synchronous reluctance machines (SynRM) have been widely used in many different industrial applications because of their high efficiency, fast dynamic response, robustness, and lower production costs,...
详细信息
The right partner and high innovation speed are crucial for a successful research and development (R&D) alliance in the high-tech industry. Does homogeneity or heterogeneity between partners benefit innovation spe...
详细信息
Named Data Networking(NDN)has emerged as a promising communication paradigm,emphasizing content-centric access rather than location-based *** model offers several advantages for Internet of Healthcare Things(IoHT)envi...
详细信息
Named Data Networking(NDN)has emerged as a promising communication paradigm,emphasizing content-centric access rather than location-based *** model offers several advantages for Internet of Healthcare Things(IoHT)environments,including efficient content distribution,built-in security,and natural support for mobility and ***,existing NDN-based IoHT systems face inefficiencies in their forwarding strategy,where identical Interest packets are forwarded across multiple nodes,causing broadcast storms,increased collisions,higher energy consumption,and *** issues negatively impact healthcare system performance,particularly for individuals with disabilities and chronic diseases requiring continuous *** address these challenges,we propose a Smart and Energy-Aware Forwarding(SEF)strategy based on reinforcement learning for NDN-based *** SEF strategy leverages the geographical distance and energy levels of neighboring nodes,enabling devices to make more informed forwarding decisions and optimize next-hop *** approach reduces broadcast storms,optimizes overall energy consumption,and extends network *** system model,which targets smart hospitals and monitoring systems for individuals with disabilities,was examined in relation to the proposed *** SEF strategy was then implemented in the NS-3 simulation environment to assess its performance in healthcare *** demonstrated that SEF significantly enhanced NDN-based IoHT ***,it reduced energy consumption by up to 27.11%,82.23%,and 84.44%,decreased retrieval time by 20.23%,48.12%,and 51.65%,and achieved satisfaction rates that were approximately 0.69 higher than those of other strategies,even in more densely populated *** forwarding strategy is anticipated to substantially improve the quality and efficiency of NDN-based IoHT systems.
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
暂无评论