Results 11 to 20 of about 943 (76)
This paper proposes an approach for segmentation of power systems to prevent uncontrolled islanding using microgrids (MGs) and increased penetration of renewable energy sources. Optimization model is defined, and a mixed‐integer linear programming (MILP)‐based model considering the fluctuation of RESs.
Arman Amini Badr +2 more
wiley +1 more source
Intentional controlled islanding based on dynamic community detection for power grid
Abstract Power system controlled islanding is an emergency control method used to stop the propagation of disturbances and avoid blackouts. Intentional controlled islanding (ICI) has been proposed as a corrective measure of last resort to split the power system into several sustainable islands.
Xu Han +4 more
wiley +1 more source
Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization
With the rapid development of the Internet in recent years, people are using the Internet less and less frequently. People publish and obtain information through various channels on the Internet, and online social networks have become one of the most important channels.
Xia Xu, Jin Tang, Hua Xiang, Gengxin Sun
wiley +1 more source
Use of Security Logs for Data Leak Detection: A Systematic Literature Review
Security logs are widely used to monitor data, networks, and computer activities. By analyzing them, security experts can pick out anomalies that reveal the presence of cyber attacks or information leaks and stop them quickly before serious damage occurs.
Ricardo Ávila +4 more
wiley +1 more source
Topology planning for autonomous MMGs: an ordered binary decision diagram‐based approach
This paper finds its motivation from the perspective of utility planners, where the flexibility of choice while reconfiguring a distribution system into Multi‐Micrgrids (MMGs) is critical. To address the topology planning problem for MMGs from this dimension, a holistic algorithm incorporating graph theory, ordered binary decision diagrams, and a ...
Hafiz Anwar Ullah Khan +2 more
wiley +1 more source
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real ...
Joseph I. Choi +2 more
wiley +1 more source
Attribute‐based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext‐policy attribute‐based encryption scheme with expressive and flexible access policy for public domains.
Hongying Zheng +4 more
wiley +1 more source
Evaluating the reliability of Multistate Flow Network (MFN) is an NP‐hard problem. Ordered binary decision diagram (OBDD) or variants thereof, such as multivalued decision diagram (MDD), are compact and efficient data structures suitable for dealing with large‐scale problems.
Rongsheng Dong +4 more
wiley +1 more source
The two‐terminal reliability calculation for wireless sensor networks (WSNs) is a #P‐hard problem. The reliability calculation of WSNs on the multicast model provides an even worse combinatorial explosion of node states with respect to the calculation of WSNs on the unicast model; many real WSNs require the multicast model to deliver information.
Zongshuai Yan +5 more
wiley +1 more source
Degeneralization Algorithm for Generation of Büchi Automata Based on Contented Situation
We present on‐the‐fly degeneralization algorithm used to transform generalized Büchi automata (GBA) into Büchi Automata (BA) different from the standard degeneralization algorithm. Contented situation, which is used to record what acceptance conditions are satisfiable during expanding LTL formulae, is attached to the states and transitions in the BA ...
Laixiang Shan +4 more
wiley +1 more source

