A collaborative system that includes mobile devices (MDs), edge nodes (ENs), and the cloud is needed where ENs at the network edge can run offloaded tasks of MDs with limited resources and energy for timely processing...
详细信息
Cloud Computing (CC) generally exhibits varying workload patterns. This autoscaling feature of CC has been extensively managed through predictive cloud resource management approaches. For this reason, a solitary forec...
详细信息
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo...
详细信息
This research discusses the method of dataset collection automatization for microwave filter synthesis by integrating machine learning techniques, thus reducing development time. Utilizing the 3D electromagnetic analy...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
Flexible Electronics (FE) offer distinct advantages, including mechanical flexibility and low process temperatures, enabling extremely low-cost production. To address the demands of applications such as smart sensors ...
详细信息
Wind power plants(WPPs)are increasingly mandated to provide temporary frequency support to power systems during contingencies involving significant power ***,the frequency support capabilities of WPPs under derated op...
详细信息
Wind power plants(WPPs)are increasingly mandated to provide temporary frequency support to power systems during contingencies involving significant power ***,the frequency support capabilities of WPPs under derated operations remain insufficiently investigated,highlighting the potential for further improvement of the frequency *** paper proposes a bi-level optimized temporary frequency support(OTFS)strategy for a *** implementation of the OTFS strategy is collaboratively accomplished by individual wind turbine(WT)controllers and the central WPP ***,to exploit the frequency support capability of WTs,the stable operational region of WTs is expanded by developing a novel dynamic power control approach in WT *** approach synergizes the WTs'temporary frequency support with the secondary frequency control of synchronous generators,enabling WTs to release more kinetic energy without causing a secondary frequency ***,a model predictive control strategy is developed for the WPP *** strategy ensures that multiple WTs operating within the expanded stable region are coordinated to minimize the magnitude of the frequency drop through efficient kinetic energy ***,comprehensive case studies are conducted on a real-time simulation platform to validate the effectiveness of the proposed strategy.
This Landslide susceptibility prediction is a critical task for Alleviating the risks associated with landslide hazards, which have significant socio-economic and environmental impacts. Existing techniques face challe...
详细信息
In modern vehicular networks, the absence of infrastructure support such as Roadside Units (RSUs) presents significant challenges for efficient task offloading and allocation. Limited computational capabilities of ind...
详细信息
The current paper proposes a new approach for peripheral speech emotion analysis and gender estimation incorporating the best machine learning architectures such as CNNs and LSTMs. Its correct depiction of emotions an...
详细信息
暂无评论