Results 11 to 20 of about 943 (76)

Segmentation of interconnected power systems considering microgrids and the uncertainty of renewable energy sources

open access: yesIET Generation, Transmission &Distribution, Volume 17, Issue 17, Page 3814-3827, September 2023., 2023
This paper proposes an approach for segmentation of power systems to prevent uncontrolled islanding using microgrids (MGs) and increased penetration of renewable energy sources. Optimization model is defined, and a mixed‐integer linear programming (MILP)‐based model considering the fluctuation of RESs.
Arman Amini Badr   +2 more
wiley   +1 more source

Intentional controlled islanding based on dynamic community detection for power grid

open access: yesIET Generation, Transmission &Distribution, Volume 16, Issue 21, Page 4258-4272, November 2022., 2022
Abstract Power system controlled islanding is an emergency control method used to stop the propagation of disturbances and avoid blackouts. Intentional controlled islanding (ICI) has been proposed as a corrective measure of last resort to split the power system into several sustainable islands.
Xu Han   +4 more
wiley   +1 more source

Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization

open access: yesJournal of Sensors, Volume 2022, Issue 1, 2022., 2022
With the rapid development of the Internet in recent years, people are using the Internet less and less frequently. People publish and obtain information through various channels on the Internet, and online social networks have become one of the most important channels.
Xia Xu, Jin Tang, Hua Xiang, Gengxin Sun
wiley   +1 more source

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them, security experts can pick out anomalies that reveal the presence of cyber attacks or information leaks and stop them quickly before serious damage occurs.
Ricardo Ávila   +4 more
wiley   +1 more source

Topology planning for autonomous MMGs: an ordered binary decision diagram‐based approach

open access: yesIET Smart Grid, Volume 3, Issue 1, Page 60-68, February 2020., 2020
This paper finds its motivation from the perspective of utility planners, where the flexibility of choice while reconfiguring a distribution system into Multi‐Micrgrids (MMGs) is critical. To address the topology planning problem for MMGs from this dimension, a holistic algorithm incorporating graph theory, ordered binary decision diagrams, and a ...
Hafiz Anwar Ullah Khan   +2 more
wiley   +1 more source

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real ...
Joseph I. Choi   +2 more
wiley   +1 more source

Modified Ciphertext‐Policy Attribute‐Based Encryption Scheme with Efficient Revocation for PHR System

open access: yesMathematical Problems in Engineering, Volume 2017, Issue 1, 2017., 2017
Attribute‐based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext‐policy attribute‐based encryption scheme with expressive and flexible access policy for public domains.
Hongying Zheng   +4 more
wiley   +1 more source

Decision Diagram Based Symbolic Algorithm for Evaluating the Reliability of a Multistate Flow Network

open access: yesMathematical Problems in Engineering, Volume 2016, Issue 1, 2016., 2016
Evaluating the reliability of Multistate Flow Network (MFN) is an NP‐hard problem. Ordered binary decision diagram (OBDD) or variants thereof, such as multivalued decision diagram (MDD), are compact and efficient data structures suitable for dealing with large‐scale problems.
Rongsheng Dong   +4 more
wiley   +1 more source

A Novel OBDD‐Based Reliability Evaluation Algorithm for Wireless Sensor Networks on the Multicast Model

open access: yesMathematical Problems in Engineering, Volume 2015, Issue 1, 2015., 2015
The two‐terminal reliability calculation for wireless sensor networks (WSNs) is a #P‐hard problem. The reliability calculation of WSNs on the multicast model provides an even worse combinatorial explosion of node states with respect to the calculation of WSNs on the unicast model; many real WSNs require the multicast model to deliver information.
Zongshuai Yan   +5 more
wiley   +1 more source

Degeneralization Algorithm for Generation of Büchi Automata Based on Contented Situation

open access: yesJournal of Applied Mathematics, Volume 2015, Issue 1, 2015., 2015
We present on‐the‐fly degeneralization algorithm used to transform generalized Büchi automata (GBA) into Büchi Automata (BA) different from the standard degeneralization algorithm. Contented situation, which is used to record what acceptance conditions are satisfiable during expanding LTL formulae, is attached to the states and transitions in the BA ...
Laixiang Shan   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy